THIS TOPIC APPLIES TO: SQL Server Reporting Services (2016 and later) Power BI Report Server For content related to previous versions of SQL Server Reporting Services, see. Use the Reporting Services Configuration Manager to configure a Reporting Services Native Mode installation. If you installed a report server by using the files-only installation option, you must use the Configuration Manager to configure the server before you can use it. If you installed a report server by using the default configuration installation option, you can use the Configuration Manager to verify or modify the settings that were specified during setup. If you plan to install the Power Pivot service as well, on SharePoint 2016, install that prior to installing Reporting Services. The Power Pivot service cannot be installed on a SharePoint server in the Custom role. This will avoid having to. Oct 08, 2013 Microsoft Key management Server (KMS) reporting / inventory. Server itself and the KMS CLIENT is the node you are going to activate using KMS server. Reporting Services Configuration Manager can be used to configure a local or remote report server instance. Note Starting with the SQL Server 2012 release, the Reporting Services Configuration Manager is not designed to manage SharePoint mode report servers. SharePoint mode is managed and configured by using SharePoint Central Administration and PowerShell scripts. Scenarios to use Reporting Services Configuration Manager You can use the Reporting Services Configuration Manager to perform the following tasks: • Configure the Report Server service account. The account is initially configured during setup, but can be modified by using the Reporting Services Configuration Manager if you update the password or want to use a different account. • Create and configure URLs. The report server and the web portal are ASP.NET applications accessed through URLs. The report server URL provides access to the SOAP endpoints of the report server. The web portal URL is used to open the web portal You can configure a single URL or multiple URLs for each application. • Create and configure the report server database. The report server is a stateless server that requires a SQL Server database for internal storage. You can use the Reporting Services Configuration Manager to create and configure a connection to the report server database. You can also select an existing report server database that already contains the content you want to use. • Configure a Native mode scale-out deployment. Reporting Services supports a deployment topology that allows multiple report server instances use a single, shared report server database. To deploy a report server scale-out deployment, you use the Reporting Services Configuration Manager to connect each report server to the shared report server database. • Backup, restore, or replace the symmetric key that is used to encrypt stored connection strings and credentials. You must have a backup of the symmetric key if you change the service account, or move a report server database to another computer. • Configure the unattended execution account. This account is used for remote connections during scheduled operations or when user credentials are not available. • Configure report server e-mail. Reporting Services includes a report server e-mail delivery extension that uses a Simple Mail Transfer Protocol (SMTP) to deliver reports or report processing notification to an electronic mailbox. You can use the Reporting Services Configuration Manager to specify which SMTP server or gateway on your network to use for e-mail delivery. The Reporting Services Configuration Manager does not help you manage report server content, enable additional features, or grant access to the server. Full deployment requires that you also use SQL Server Management Studio to enable additional features or modify default values, and the web portal to grant user access to the server. Requirements The Reporting Services Configuration Manager is version-specific. The Reporting Services Configuration Manager that installs with this version of SQL Server cannot be used to configure an earlier version of Reporting Services. ![]() If you are running older and newer versions of Reporting Services side-by-side on the same computer, you must use the Reporting Service Configuration manager that comes with each version to configure each instance. To use the Reporting Services Configuration manager, you must have the following: • Local system administrator permissions on the computer that hosts the report server you want to configure. If you are configuring a remote computer, you must have local system administrator permissions on that computer as well. • You must have permission to create databases on the SQL Server Database Engine used to host the report server database. • Windows Management Instrumentation (WMI) service must be enabled and running on any report server you are configuring. The Reporting Services Configuration Manager uses the report server WMI provider to connect to local and remote report servers. If you are configuring a remote report server, the computer must allow remote WMI access. For more information, see. • Before you can connect to and configure a remote report server instance, you must enable remote Windows Management Instrumentation (WMI) calls to pass through Windows Firewall. For more information, see in SQL Server Books Online. The Reporting Services Configuration Manager is installed automatically when you install SQL Server Reporting Services. To Start the Reporting Services Configuration Manager • Use the following step that is appropriate for your version of Microsoft Windows: • From the Windows start screen, type Reporting and select Reporting Services Configuration Manager from the earch results. • Select Start, point to All Programs, point to Microsoft SQL Server 2017, and then point to Configuration Tools. If you want to configure a report server instance from a previous version of SQL Server, open the program folder for that version. For example, point to SQL Server 2014 instead of Microsoft SQL Server 2017 to open the configuration tools for SQL Server 2014 server components. Select Reporting Services Configuration Manager. • The Reporting Services Configuration Connection dialog box appears so that you can select the report server instance you want to configure. Select Connect. • In Server Name, specify the name of the computer on which the report server instance is installed. The name of the local computer appears by default, but you can type the name of a remote SQL Server instance if you want to connect to a report server that is installed on a remote computer. • If you specify a remote computer, select Find to establish a connection. • In Report Server Instance, select the SQL Server Reporting Services instance that you want to configure. Only report server instances for this version of SQL Server appear in the list. You cannot configure earlier versions of Reporting Services. • Select Connect. Next steps More questions? As we discussed in Chapter 1, Reporting Services is dependent on ASP.NET version 1.1 hosted on IIS, and on SQL Server 2000 SP3a Standard Edition and later. Reporting Services won't work, and is not supported, on SQLExpress or MSDE Editions of SQL Server, and there's a different version specifically for Yukon (SQL Server 2005). ![]() Sure, you can use SQLExpress, MSDE or a non-SQL Server database as a data sourcejust not as the Reporting Services Catalog. In this chapter, we discuss various installation setups you can use to install and configure Reporting Services. For the most part, this process is managed by the Setup.exe installation wizard, so expect to be prompted for a number of configuration options that determine how, where, and whether each segment of the Reporting Services package will be installed. We know that there are a variety of ways to install Reporting Services, so we've tried not only to address the common case, but also provide hints and techniques to be used for some of the more sophisticated installation scenarios. To make this process as painless as possible, we've broken this chapter down into several sections: • Installation Pathways and Preparation: This section discusses things you need to consider for each of the configuration scenariostypical or not. Here we show additional details and considerations regarding SSL configuration and other security issues, separate IIS and SQL Server systems and instances, and using the command-line installation option. • Step by Step: Installing Reporting Services on a Server with IIS: This section assumes a typical development machine running IIS, SQL Server, and a Visual Studio.NET tool. It walks through the Setup wizard step by step and discusses how to respond to each dialog. • After InstallationTuning and Reconfiguring: This section discusses the various configuration files and the command-line tools used to manipulate the files and perform other security and maintenance tasks. If you choose to use Secure Sockets Layer ( SSL) (as we recommend) and you also decide to force SSL for all communications with the Report Manager and Report Server, you should revisit the Tuning and Reconfiguring section after the installation wizard completes, which allows you to tune the config files and change the SecureConnectionLevel. • Testing the Installation: This section shows step by step how to verify that your Reporting Services installation is ready to produce reports. Testing helps you install the sample reports using Visual Studio.NET and verify that you can successfully deploy and retrieve reports with a browser. • Installing Reporting Services on a Web Farm: This section walks through the process of setting up Reporting Services on a web farm. This configuration uses several linked IIS servers to share the same Report Server database. • Removing Reporting Services: In case you need to un install Reporting Services, this section discusses the mechanisms and side effects of the tear-down process. Installation Pathways and Preparation Before we get started, we need to mention the most important prerequisite: the website that hosts the Reporting Services ought to support SSL and therefore needs an SSL web server certificate. In Appendixes A and B, we've included a detailed walkthrough and an article written for MSDN that should prove useful to you if you need further guidance in installing an SSL web server certificate and (if necessary) setting up your own certificate services. Be sure to check out the DVD content as well because we've provided plenty of short media clips on different aspects and issues associated with installation and configuration. There are two major parts of installation: Server components and client components. The client components are needed by developers to design reports, provide some report programming and database samples, as well as provide a suite of command-line tools to administer the Report Server. These client components are not needed for your users to run reportsall they need is a web browser (HTML 3.2 and later). Operating System Choices Reporting Services can be installed on the recent breeds of Microsoft operating systems as shown below. We categorize these in two groups: 'server' and 'workstation' operating systems. Server operating systems include Windows Server 2003, Windows Small Business Server 2003, and Windows 2000 Server. Workstation operating systems include Windows XP Professional and Windows 2000 Workstation. For test and development situations, we feel that workstation operating systems are suitable platforms, and Windows XP Professional can be an ideal platform for a single machine where you can safely install all of the Reporting Services components and expect reasonable performance and up-to-date functionality. However, take note that Windows XP has a default maximum limit of 10 concurrent connections to its IIS server. This is usually adequate when you're testing as a single user but can prove to be very limiting and frustrating in some development situations. For example, as we'll see in Chapter 4, you may hit this barrier of 10 connections when you want to test accessing the Report Server and Report Manager concurrently under the context of different users. Consider that each web browser session consumes at least two IIS connections and often as many as four. All too frequently, we've seen that connections can hang and block the IIS server, which reports this stop page by returning a 403.9 error code message (Too many users connected). Sometimes, even after the performance monitor (Perfmon) shows that all connections to IIS have been released, new connections still generate strange errors. To address this issue, the first and most important thing we recommend for production environments is to use an operating system from the group of server OSs listed above. These server-class operating systems are designed for 'serving' and don't have a limit on the possible number of connections to IIS. We recommend that you use either Windows Server 2003 or Windows 2000 Server for your production server. However, Windows Server 2003 is more secure. If you must use Windows XP and want to address 403.9 errors that have blocked the IIS server, you can take either of two approaches, depending whether or not you want a treatment or cure. The 'treatment' approach is to restart IIS, either at the command prompt with the IISRESET command, through the Services MMC snap-in or through the IIS MMC snap-in. Restarting IIS usually alleviates the problemalbeit temporarily. The 'cure' is to delve into the Windows XP IIS metabase and increase the maximum connection limit to no greater than 40 connections. No, you can't go beyond 40 connections because IIS is hard-coded to explicitly slam you directly back down to 10 if you try to go above 40. In our development situations, we found it frustrating to work with the 10-connection governor for any extended period of time, but once raised to 40 in normal development scenarios we found it adequate to resolve IIS 403.9 (Too many users connected) errors. See Appendix D for the steps to take to update the IIS metabase. Microsoft also suggests that you make the IIS connection timeout shorter, and we show you how to do that in Appendix D. Installing Reporting Services on Domain Controllers When installing Reporting Services on a Windows 2003 server that is also a domain controller, no manual configuration is necessary for Reporting Services to install and run properly. However, on a domain controller on Windows 2000 Server, while Reporting Services installs properly it is not automatically activated. In this case, you'll need to perform the following steps, either before or after running Setup, in order to properly configure Reporting Services to run on a domain controller: • Grant Impersonate Privilege to the IWAM_account. For more information, see the Knowledge Base Article 'IWAM Account Is Not Granted the Impersonate Privilege for ASP.NET 1.1 on a Windows 2000 Domain Controller with SP4' (KB 824308). • Remove the IWAM_account from the Guest group. Guest users cannot store or maintain encrypted content. For more information, see the Knowledge Base Article 'Roaming Profiles Cannot Create Key Containers' (KB 265357). Then reboot the computer. All on One Machine (Typical Development Scenario) One approach to installation is to simply execute the Reporting Services Setup.exe without using command-line arguments and install everything on a single machine, accepting all the wizard's defaults. (In this case, you need to do this with Local Administrator privileges.) The Setup.exe installation wizard inspects the local machine and performs an initial check, looking for any 'missing' components, some of which the wizard might be prepared to update for youfor example, the.NET Framework, although it will only report other missing dependencies in a dialog when it cannot find a qualifying version of SQL Server 2000. These components are 'missing' based on the bold assumption that your intention is to install the Reporting Services, Report Designer add-in utilities, documentation, and sample reports all on the same machine. This is the simplest installation approach, assuming you are targeting a development machine that already has the following Setup: • A Visual Studio.NET 2003 Development Tool installed (e.g., Visual Basic.NET 2003) • SQL Server 2000 Developer Edition or better with Service Pack 3a • Internet Information Server ( IIS) with ASP.NET 1.1 • An enabled Default website with an SSL web server certificate installed. It's best to make sure the IIS service is running on your system before installing Reporting Services. ( IIS is called the 'World Wide Web Publishing' service in the Services management console ( MMC)). If you already installed Reporting Services (before IIS), you'll need to use a command prompt. Navigate to C: Windows Microsoft.NET Framework v1.1.4322 and execute aspnet_regiis i. To register ASP.NET in the IIS metabase. Setting up a machine with these prerequisites should be straightforward enough. The only thing that might trip you up is the installation of an SSL web server certificate that we casually slipped in thereespecially if you've not had much exposure to IIS and Certificate Services. Please, don't install Reporting Services without an SSL certificate. Yes, the wizard will let you uncheck Require an SSL Certificate, but be prepared to tell your manager why you needlessly (and carelessly) exposed your data and potentially your systems to the world. Keep in mind that there are situations in which user credentials (logon name and password) need to be passed to and from the Report Server and Report Managereven if you're simply updating data sources with the Report Manager. If you don't have SSL installed, those credentials can be harvested by evil people. Think about how careful you should be when entering credit card details into a web form. The same degree of care should be applied to any user credentials that you enter into web forms such as the Report Manager. Microsoft gives you all the tools and the Setup wizard defaults to remain secure, so there can be no excuse if you choose to be reckless. Sure, Reporting Services works without SSL, and perhaps in a development environment you might be tempted to go without this degree of protectionbut we still don't recommend this approach. If you've not used SSL in production before, it would be a good idea to experiment with it in a development environment first It's possible to separate the installation into several phases and place the Report Designer on machines where Visual Studio.NET 2003 is installed (and licensed), and install the Reporting Services (Report Manager and Report Server) on any machines running IIS. In a web farm environment, you can have several machines hosting the Reporting Services Server components, all accessing the same Report Server database catalog. The present license arrangements (as we understand them) require you to have a SQL Server license (either per seat or per CPU ) for each server that hosts the Reporting Services Server components (Report Manager and Report Server), whether or not you have SQL Server installed on that machine. In the case of per seat licensing, that means each user that accesses the Reporting Services or the Design Tools will need a CAL (Client Access License). No, we're not licensing experts (or lawyers), and of course licensing is a complex subject, so read your licensing conditions very carefully. I know Bill Vaughn has worn out three pairs of spectacles going over the minutiae of the United States EULA paragraph 12, rereading and rereading it. Beats counting sheep, doesn't it, Bill? Peter If installation doesn't go smoothly, you may need to use some of the command-line administration tools and delicately futz with some configuration files. We explain those tools in brief later in this chapter, but we can't cater to every single caveat here, especially because new caveats can be created by Service Packs. For the latest information, take a look at our website () and join our community, as we'll be doing our best to help folks out there stay current on evolving Reporting Services technology. Well, did you notice in paragraph 54 that the EULA grants rights to your first-born child in servitude to Microsoft? Bill Installing Only the Report Designer Add-In The Report Designer add-in for Visual Studio.NET is used to interactively design reports (as we discussed in Chapter 1). If you want to install just the Report Designer add-in to a target machine, run the Reporting Services Setup.exe file, but ensure beforehand that you already have a Visual Studio. NET 2003 Development Tool like Visual Basic.NET installed. Don't worry when the wizard reports that ASP.NET, IIS, or the Default website are not installed if you deliberately don't have them on the target machinethey aren't needed to install and use the Report Designer add-in. On the wizard's Feature Selection dialog, just choose that you only want the Report Designer. It's probably a good idea to install the Books Online ( BOL) help file as well because it can be hosted in the Visual Studio.NET designer. In Chapter 4, we'll show you how to customize your Visual Studio.NET Help search interface to find topics in the Reporting Services help files. You may be asked for a 25-character CD key if the wizard can't detect a qualifying version of SQL Server on the target machineso make sure you have the CD key from your SQL Server handy. (If you've mislaid the hard copy of the CD keyyou should be able to locate it in the registry of the SQL Server machine under HKLM SOFTWARE Microsoft Microsoft SQL Server 80 Registration:CD_Key). We'll first use the Design Tools in Chapter 3 when we show how to use Design wizards, and we really go to town with the Report Designer in Chapter 6. After installation, if you have issues deploying reports, and you're getting messages like: 'The underlying connection was closed: Could not establish trust relationship with remote server.' Chances are you need to deploy using HTTPS and include the same URL embedded in the SSL web server certificate. Installing Only the Sample AdventureWorks2000 Database You can install the Sample AdventureWorks2000 database on a target SQL Server by running Setup on the server and selecting just the AdventureWorks2000 database from the Feature Selection dialog (see ). After the AdventureWorks2000 database is installed, only administrators will be able to get at the data to produce reports from it, so don't forget to add domain groups to the database and at least assign them to the SQL Server db_datareader role. Select the Portions of Reporting Services That You Wish to Install Installing Reporting Services on a Server with IIS In a production environment you probably won't want to install the Sample Databases or the Design Tools onto a production SQL Server or IIS server. However, before you run Setup (the installation wizard), step through this checklist: • Decide which IIS server is to host the Reporting Services. Initially, the IIS server must have the Default website enabled. • Check that the IIS server has an SSL web server certificate. If returns a web page, but does not, you need to install an SSL certificate. For detailed information on installing SSL, see Appendixes A and B and watch the video clips. • Decide where the Reporting Services' own catalog database is going to be installed. This needs to be SQL Server 2000 with at least SP3anot Yukon, MSDE, or Personal Editions. This SQL Server need not be on the same server as the IIS components, but if it is, you economize on the SQL Server licences that you'll need. • Do you have sufficient privileges on your database? Make sure you have an account that is a member of the sysadmins role on the SQL Server to use during installation. • If you need to run Setup with command-line options, consider our security caveats, and especially consider encrypting any Setup ini file. • Launch the installation wizard from a non-network path. Which Account Is Running the Install Wizard? During installation of Reporting Services, the bootstrapper installation wizard logs on to the SQL Server used to host the Report Server catalog databases with the wizard's account credentials, using 'Trusted' connection SSPI security. This means the target SQL Server must expose a login account that corresponds to the rights granted to the user running the wizard. As we said earlier, it's easiest if the wizard is run with Administrator credentials as SQL Server automatically creates a login account for all system administrators. If the domain administrator won't let you have access to the Administrator account and you choose to use an ordinary Domain User account, it must belong to the System Administrators (sysadmin) SQL Server Security 'Server Role' (at least during the install). The wizard will check up on you to ensure that it is and won't continue if it isn't. (If you're a trainee SQL Server guru, you might think that the Database Creators (dbcreator) SQL Server Security 'Server Role' would be sufficient. However, the bootstrapper installation wizard also needs to make a couple of calls to the sp_addrole stored procedure, in addition to creating the Reporting Services databases. Accounts that are only members of the Database Creators (dbcreator) role can't do that.) Of course, using a trusted connection is by far the most sensible route from a security standpoint, but there may be situations where you have the SQL Server in one Active Directory Domain, the Reporting Services in another Active Directory Domain, and no formal Active Directory Trust between the two Domains. Perhaps you have no Active Directories at all. In this case, it means that you won't be able to add the Domain User Account under which you are running the installation wizard to the SQL Server System Administrators SQL Server Security 'Server Role.' Thus, the wizard won't be able to create the database catalogs. We told you it would be easier just to steal the Administrator's password. Don't worry, you are not poochedthere is a solution. You can instruct the wizard to use a SQL account that belongs to the sysadmin role instead. To do this, launch the Setup installation wizard and provide a few command-line options: RSSETUPACCOUNT and RSSETUPPASSWORD. We discuss these options in the next section. Security Bulletin 1 If you put sensitive information into an ini filethings like the credentials of a SQL Server sysadmin account, as when setting the RSSETUPACCOUNT and RSSETUPPASSWORD options, practice safe computing. Setting ACLs on files should be your first line of defense, but you should also be concerned about what happens to those files when they are deleted. Before you edit and save any values in your copy of the template file, encrypt your copy of the file (right-click it, select Properties, on the General tab click the 'Advanced' button, and then select Encrypt contents to secure data). In addition, consider the permissions on this option file. Well, if you don't follow our advice you might as well just write the SA password on a Post-it note and stick it on the monitor for all to see. Consider that when you delete an unencrypted ini file, any credentials or other information it contained could be easily 'harvested' from the disk. A wealth of utilities floating around the Internet (for free) are for doing just that, as anyone watching one of the crime shows on TV would know. Security Bulletin 2 We also hope that if you are going to be using a SQL Server account for the Setup (i.e., setting the RSSETUPACCOUNT and RSSETUPPASSWORD options) that you have assigned an SSL certificate to the SQL Server and have configured the SQL Server to force encryption. If you haven't, you should be aware that SQL Authentication, which is what will by default be used over an unencrypted connection, is fairly insecure. One final thought for the paranoid: After the installation, you can always change the Password for the SQL Server account that you used during installationjust don't rely on this approach. It only takes someone listening to grab the credentials while on the wire and immediately create their own backdoor sysadmin account. Yes, folks, we've seen this kind of thing happen in some environments when the door was only open for a few seconds. (Sleep well tonight.) Installing Reporting Services on Web Farms It's possible to scale out and configure a number of IIS servers to all use the same Report Server database. Such a configuration is called a web farm. Web farm configurations are only available to the Developer/Enterprise/Evaluation versions of SQL Server, but there are licensing restrictions on use of the Developer or Evaluation versions in production. If during the installation you instruct the wizard to use a pre-existing Report Server database, the wizard asks if you want to setup a web farm and leads you through the installation steps. There may be occasions when you want to take a stand-alone Reporting Services installation and create or join it to an existing web farm. With some configuration file editing and some command-line utilities ( rsconfig.exe, rsactivate.exe, and possibly rskeymgmt.exe), you'll be able to get it to work. We briefly discuss some these utilities to provide an overview of what they do in 'Installing Reporting Services on a Web Farm,' later in this chapter. Licensing Your Reporting Services Installation As with the installation of the Report Designer, if the wizard cannot find a qualifying installed SQL Server 2000, it asks you for the 25-character product key of a qualifying version. To comply with the license agreement, you need a SQL Server 2000 server license for every machine on which the Reporting Services Server components are installed. If you decide to split the installation so that the Reporting Services SQL Server Catalog is on one machine and the IIS Report Manager and Report Server are on another machine, you'll need two SQL Server 2000 server licensesbut only one if you run them on the same box. As we said earlier, we're not licensing experts, and licensing arrangements change and are different from locale to locale, so please check your license arrangements carefully. For development purposes only, our solution is that we subscribe to MSDN Universal, which includes SQL Server Developer Edition, which has sufficient rights and licenses for our development machinesbut the MSDN Universal is not licensed for any production purposes. Command-Line Options for the Installation Wizard It's possible to run the installation wizard from a Command prompt window and provide some or all of the options to the wizardit's even possible to do a completely silent install. The command-line options are typically supplied as parameters to Setup.exe or through an ini file. You'll find a template ini file in your Reporting Services distribution media. The template is well documented and explains all of the options. It's convenient (and a good idea) to copy this template and edit the values you need. Next, launch the Setup.exe wizard from a command prompt with setup.exe /settings myoptions.iniassuming myoptions.ini is your file based on the template.ini. Preparing Your System to Run the Setup Wizard If you've already received an SSL web server certificate from a public Certificate Authority or from an Enterprise Certificate Services Certificate Authority within your Active Directory Domain and created and installed an SSL web server certificate for the web server hosting Reporting Services, you'll have little to do but answer a few simple questions in the following Reporting Services Setup dialogs. If not, then you might need to take a couple of side trips to make sure this SSL infrastructure is installed. We've provided a detailed explanation of the steps you'll need to take to enable SSL security for your website in Appendix A, 'Using SSL to Protect Your Data,' and Appendix B, 'Using Secure Sockets Layer for Reporting Services.' Better yet, watch the Guide me! Narrated screen capture demonstration that shows how to do this.
0 Comments
![]() Feb 08, 2008 This Glass Break Sensor will activate your car alarm if someones breaks or cracks your car window http://www.asianwolf.com/glass. ![]() Break glass (which draws its name from breaking the glass to pull a fire alarm) refers to a quick means for a person who does not have access privileges to certain information to gain access when necessary. Systems containing primary source data (information) for treatment, must develop, document, implement and test break glass procedures that would be used in the event of an emergency requiring access to ePHI. These systems must have a clearly stated and widely understood procedure for allowing access via alternate and/or manual methods. The system administrator should document any actual emergency access for later audit & review. Typically, a special audit trail is created to monitor such access. Standard access controls should be established with sufficient rules to minimize the number of times break–the–glass needs to occur. Break–glass is based upon pre–staged “emergency” user accounts, managed in a way that can make them available with reasonable administrative overhead. This solution can be used with a broad range of existing systems and architectures that require operators to login, such as with username and password, before access is granted. The break–glass intended to specifically cover emergency cases and should not be used as a replacement for a helpdesk. User authentication system is a typical mechanism used to control and monitor access to sensitive data. It is designed to preserve security by restricting access. In clinical care, a delay in access is likely to disrupt patient care that may cause patient discomfort, injury or worse. For this reason HIPAA requires covered entities to have mechanisms in place that assure patient care is not impaired by problems with the user identification and authentication. Scope An emergency access solution should be used only when normal processes are insufficient (e.g. The helpdesk or system administrator is unavailable). Looking for SAFETY TECHNOLOGY INTERNATIONAL Fire Alarm Break Glass Cover,6.5 x 9 In (4AGA8)? Grainger's got your back. The argument that some types of fire alarm boxes are too difficult or costly to test in this manner—those with a break-glass front or a glass rod to discourage false alarms, for example—does not negate the requirements to test by manual actuation. You must actuate the manual fire alarm box by operating the. ![]() ![]() Examples of situations when ‘break glass’ emergency access might be necessary: • Account problems: • Forgotten Username/Password (e.g. After extended absence or vacation) • Locked Password (e.g. Mis–typed too many times) • No User Account (e.g. A clinician from another organization or a new clinician is assisting a facility during an emergency) • Authentication problems: • Central Authentication System failure (e.g. A CAS server is down) • Smart Card or biometrics reader failure (e.g. Reader or biometric is damaged) Note: In cases where the authentication system fails, there should be an alternate authentication mechanism such as username/password. • Authorization problems: • An emergency medical situation thrusts an individual into a role where s/he lacks sufficient access rights (e.g. An administrative assistant is entering orders during an emergency) Break Glass solution The break–glass solution is based on pre–staged emergency user accounts, managed and distributed in a way that can make them quickly available without unreasonable administrative delay. This solution should be simple, effective, and reliable. Pre-staging Accounts Emergency Accounts should be created in advance to allow careful thought to go into the access controls and audit trails associated with them. The following factors should be considered: • Username should be obvious and meaningful, such as breakglass01, so the account name would be inappropriate under normal operations and would stand out in audit trails. • Strong passwords should implemented, but is important, that they not be so difficult that in an emergency, the user would have trouble entering it. • Account Permissions should be set to minimum necessary privilege. Limit emergency access to the minimum data and functionality needed to perform the task. This could potentially include view–only capability, prohibiting access from outside the local console or network, limiting to data acquisition only, or prohibiting access to previously acquired data, but due to the difficulty of anticipating emergency needs, you may choose to allow full access to emergency accounts. • Auditing should be enabled if available, to log details of the account usage and details of the work carried out while using the account. Some systems may recognize emergency accounts and raise the system auditing level or increase audit logging of only the emergency accounts. Note: Ensure that the individuals who create the accounts are not the ones reviewing the audit trails since this can be a source of abuse. The ‘break glass’ accounts and distribution procedures should be documented and tested as part of implementation. Distributing Accounts Pre–staged accounts need to be carefully managed to provide timely access when needed. Break–glass requires that the emergency–account details be made available in an appropriate and reasonable manner. These details may be provided on media such as a printed page, a magnetic–stripe card, a smart card or a token. Books.google.com.tr - Giving you a combination of general principles, applied practice and information on the state-of-the-art, this book will give you the information you need to incorporate the latest systems and technologies into your building projects. It focuses on a number of important issues, such as: Network communication. Intelligent Buildings and Building Automation. Gibb, AJ; Edmonds, B; Silver, RA; Cull-Candy, SG; Colquhoun, D; (2012) Activation of NMDA receptors. In: The NMDA Receptor. Full text not available from this repository. Abstract © Oxford University Press 1994. All rights reserved. Understanding the processes occurring during receptor activation is of fundamental importance to pharmacology, and activation of receptors such as the NMDA receptor, which have an integral membrane ion channel, has proved to be particularly amenable to study using single channel recording techniques. The activation of muscle and Torpedo acetylcholine receptors (AChRs) has been studied in great detail. Using these approaches the rates of the reactions involved in receptor activation have been estimated and for the endplate AChRs these rates are consistent with the observed rate of synaptic transmission at the neuromuscular junction. This has led to the expectation that new insights into the processes underlying the NMDA receptor-mediated component of excitatory post-synaptic currents (NMDA EPSCs) will be obtained from studies of NMDA receptor single channels. Type: Book chapter Title: Activation of NMDA receptors ISBN-13: 701 DOI: UCL classification: URI. ![]() The physiology of N-methyl-d-aspartate (NMDA) receptors is fundamental to brain development and function. NMDA receptors are ionotropic glutamate receptors that. Thus, NMDA receptors in different parts of the brain. Thus NMDA receptor activation leads to a calcium influx into the post-synaptic cells. NMDA receptors (NMDARs) are glutamate-gated cation channels with high calcium permeability that play important roles in many aspects of the biology of higher organisms. They are critical for the development of the central nervous system (CNS), generation of rhythms for breathing and locomotion, and. ![]() Thus, NMDA receptors in different parts of the brain. Thus NMDA receptor activation leads to a calcium influx into the post-synaptic cells. NMDA Receptor Function and Physiological Modulation. NMDA receptor activation leads to opening of an ion channel that is selective for cations, resulting in. I AM HAVING THE SAME PROBLEMS. AFTER I HAVE FINALLY RECEIVED MY PAYONEER CARD AFTER 2-3 MONTHS OF WAITING, AND I JUST CAN;T ADD IT TO MY AIRBNB ACCOUNT. I CONTACTED AIRBNB, AND THEY TOLD ME TO CONTACT PAYONEER. I DID SO, AND THEY SEND MY BACK TO CONTACT AIRBNB. NONE OF THEM ARE ABLE TO MAKE THIOS PAYOUT METHOD WORK. HOWEVER, MY CARD AND ACCOUNT IS ACTIVE IN PAYONEER, SO THE PROBL;EM IS FROM AIRBNB. WHEN I TRY TO ADD PAYONEER, THEY GIVE AN AUTOMATED RESPONSE THAT I HAVE ALREADY SUBMITTED FOR THIS, AND GIVE ME A LINK TO SIGN IN MY PAYONEER ACCOUNT, BUT THEY DONT ALLOW ME FROM AIRBNB TO ADD MY PAYONEER DETAILS. THIS PROBLEM IS STILL UNSOLVED FOR MONTHS, SO I AM FORCED TO USE PAYPAL. Hola people, I had the same problem. I used to use payoneer, received a new card and couldn't add it to my payment methods. I wrote airbnb and they contacted me. Apparently they said airbnb was not activated on my payoneer account. I started a chat with customer care on payoneer and they told me exactly the same, that my card was active but airbnb was desactivated for some reason. They proposed to activate it straight away. Then y went back to my airbnb account and payoneer was again enlisted in my payment options and 2 days later i started to receive again payments through payoneer after one year having the headaches of WU. Hope this was clear, Good luck! ![]() Click here to activate your PayPal Business Debit Masterard or follow the directions below. Select the card to activate and click Activate Now. Payoneer makes it insanely easy to get paid online. Here's how to get A Payoneer Card with $50 bonus. The card will be delivered to your home. To add to George’s comment, please remember that the Payoneer MasterCard is a prepaid card. Once you’ve activated it, you’ll need to be sure to load your funds. When I activate my payoneer card by paying 100$, can I retrieve this amount later via a money transfert transaction? Jan 16, 2016 - 3 min - Uploaded by Premium DownloadsIn this video we are show you how to activate you prepaid master debit card with online. ![]() ![]() ![]() TurboCollage 6.0.0.8 With Activation Code! TurboCollage is a light-weight software program software that aims to help you create collages consisting of images, texts, as well as transparent or custom backgrounds. TurboCollage Features: User-friendly layout and import/export options: •Gui appears clean and intuitive, allowing you to add images in the workspace using the built-in navigation button or drag-and-drop support. Webroot Spy Sweeper serial number, Webroot Spy Sweeper all version keygen, Webroot Spy Sweeper activation spy sweeper 3.5 crack code. Code webroot spysweeper 3.5 keygen spy sweeper serial 3.5.0 spyagent 5.3 serial spyagent serial spyanywhere serial spyblocks serial spyblocs 6.0 serial crack spyblocs 6.0. Tag: SUPERAntiSpyware Professional 6.0.1242 activation code. SUPERAntiSpyware Professional 6.0.1242 Crack+Serial Key Free Download. Lita-June 1, 2017. TurboCollage 6.0.0.8 With Activation Code! TurboCollage is a light-weight software program software that aims to help you create collages consisting of images, texts. TurboCollage 6.0.0.8 With Activation Code! TurboCollage is a light-weight software program software that aims to help you create collages consisting of images. ![]() •Works with the following file formats: JPEG, Ying, BMP, TIFF, and GIF. You can print or export the generated collage to one of the file formats listed above, or save it as a project on your computer so you can easily import Turbocollage Activation Code Free Download Turbocollage 6.0.0.Eight With Activation Code! Turbocollage is A Light-weight Software Application Software That Targets That Will Help You Create Collages Which Include Photos, Texts, As Well As Obvious Or Custom Backgrounds. Turbocollage Crack Functions: • Consumer-friendly Layout And Import/export options: •gui Seems Clean And Intuitive, Permitting You To Feature Images Inside The Workspace Using The Integrated Navigation Button Or Drag-and-drop Guide. •works With The Following Record Formats: Jpeg, Ying, Bmp, Tiff, And Gif. You May Print Or Export The Generated College To One Of The Document Codecs Listed Above, Or Shop It As A Assignment For Your Computer So That You Can Effortlessly Import It For Modifying Obligations Within The Future. • Customize Your Collages: • Permits You To Transport Pix To The Desired Position Inside The Paintings Environment, Delete The Chosen Photograph, Alternate The Size Of The Items, Lock The Photograph And Textual Content, And Change The Factors Inside The Collage. Torbucoolage Helps You To Pick Between Exclusive College Styles (mosaic, Photograph Stack, Image Grid, Center Body, Mosaic Aberration). • Many Disc May Be Applied To The Layout, Meaning You Can Pick Between Predefined Size Alternatives (eg Pockets, Poster, Box), Alternate Orientation (horizontal Or Vertical), Modify Spacing Between Items, And Change The Form Of Corners. • You Can Pick Out A Obvious Background, Upload An Photo From Your Pc, Or Pick Out A Historical Past Colour, And Draw A Shadow With Custom X And Y Offset And Blur Alternatives. • Custom Text Can Be Brought For Your Images. You May Write Textual Content Without Delay In The Principal Window Or Paste It From The Clipboard, Exchange The Text In Phrases Of Font, Style, Size, Alignment, Change Historical Past Opacity And Color, In Addition To Upload Shadow Text. Whats New: • Create Collages In A Wide Range Of Sizes • Beautiful Textual Content At Your Fingertips • Create Excellent Picture Networks • Wise Seek Algorithms Primarily Based On Optimized Picture Mode Click On Under To down Load turbocollage 6.Zero.0.8 With Activation Code! Commands: • Download & Deploy Application. • Use Given License Plate To Activate This System. Incoming Searches: Turbocollage Unfastened Turbocollage Activation Code Turbocollage Online Turbocollage 5 Activation Code Turbocollage Crack Turbocollage Apk • • • • • • • Download Now Category. 12 strand DNA activation CD featuring twelve interdimensional layers activation using color and the sacred Solfeggio sounds with Kathy Wilson, Warrior Priestess 12 strand DNA activation CD 'The emotional peace is remarkable. I've grown peace and courage that I've never known. I respond to any situation from a place of self-knowledge and self-acceptance that is very empowering.' 'Since having my activation, I feel more at peace, more grounded, more at ease with life in general.' Westminster, CA 'I felt an immediate Spiritual connection, like a huge dark fog had been lifted. I felt a connection to everything around me.' Cheryl Hartlen Vancouver, B.C., Canada 'Shortly after I had my activation, I started conducting energy healings for my friends. I don't know how I got the idea, Ijust knew how to do it.' Nevada 'I definitely feel more able to view things from higher perspectives. I feel like I am residing from a place of higher perspective instead of just occasionally visiting.' Florida 'I have had an enormous amount of energy and I feel rejuvenated. I feel very grounded and energetic.' Aug 24, 2009 12 Strand DNA Activation. The name 'Church of the Cosmos: Temple of Light' (COTC. A Meditation for the Methane Leak in L.A. Namaste, The question that I receive frequently in my webinars and DNA Activation coaching sessions is: “What blocks natural 12 Strand DNA Activation”? Powerful Spells. If you are not serious about your wishes, my spells are not for you. I provide are the genuine article. If you change a scheduled. 144 Double Helix Strand Spiritual DNA Activation. (if you are ready to physically leave meditation). The activation of each additional 12 Strand increment. Interdimensional 12 Strand DNA Activation connects you to your spiritual guideance, all living things, and the other twelve dimensions. ![]() Troy, NY 'This activation is for anyone who is ready to open themselves to their next step - awakening dormant levels of their true essence to its potential.' Seattle, WA 'My food cravings have been diminishing. I am not spending my days secretly bingeing on junk food.' New York 'Since the activation I feel turbocharged and am always amazed at how much more energy I have.' ![]() Tim Steinruck Vancouver, B.C., Canada 'As a professional psychic and channel, I could not have opened up so fully (without the DNA activation). I am now better connected to Spirit through the Archangel Uriel.' 'During the activation a great feeling of peace - that connection to my soul. I recommend this activation to anyone on a spiritual journey - it was wonderful!!!! Mary S in Your Spiritual Evolution NOW. And Enjoy inspirational, informational, and spiritual articles sent to you twice monthly. When you sign up you'll get my ebook, Overcoming F-F-Fear Read past issues in the dusty, crusty archives The Interdimensional 12 Strand DNA Activation CD It's time. The energy on the planet is calling for us all to raise our vibration. After eons of being disconnected from the spiritual portion of your DNA, you can once again experience being your Divine Self. Step up to the next level of spiritual evolution with the activation of your 12 DNA strands and the 12 layers of interdimensional energy that surround them. ' For those who carry the activated DNA, love will lead. For those who are still undergoing the changeover, love will be easier to attain. For those who have yet to awaken, fear will be amplified until a higher way is entertained.' Seven Sisters from Lauren Gorgo With the CD, you'll enjoy a wonderful experience and successful activation as you participate in the activation of your 12 DNA strands, the 12 layers of interdimensional energy that surround each DNA strand, and your Akashic Record which resides within each DNA strand. The Interdimensional 12 Strand DNA Activation CD includes pre-instructions, the guided visualization for the activation of your 12 DNA strands and the activation of your 12 interdimensional layers of energy, the sounds of the Sacred Solfeggio tones, and post-activation instructions and information. About Your 12 DNA Strands As scientific research has now proven, our DNA, shown on this page in the familiar double helix configuration, holds the genetic codes for your physical and emotional evolution. ![]() Still to be discovered by science is the fact that your DNA has a much greater purpose than simply being a blueprint for your body. The Genome Project decoded approximately 3% of the total physical DNA. The remaining 97% was then termed 'junk', inferring it has no purpose. The truth is that the human body is extremely efficient and anything that is of no use becomes atrophied and is evolved out of existence within a few generations. If 97% of our DNA is junk, why do we still have it? That so-called 'junk DNA' in your body contains all your history since you first incarnated onto this planet, many lifetimes ago. It's where your Akashic record, the record of your Soul, resides. Our DNA has been called a living library because of the wealth of information stored on it. 'Hard to believe, but lurking in your DNA are many energies that are quantum. They're interdimensional attributes of biology clearly given to you by the Pleiadians over 50,000 years ago.' There are ten additional strands of DNA, or five double helix strands, which were eons ago. Science has yet to discover these strands, although they have seen the shadows of them on their electronic microscopes. They call them 'shadow DNA'. With the 12 Strand DNA Activation, you have access to ten times the information available through your DNA.These additonal strands encompass the following areas of your life: • Connection to God/Spirit • Inner vision, receiving messages from spiritual guidance • Communication, both physical and spiritual • Love, both human and Divine • Physical body • Life force energy (Chi) and personal will What makes The Interdimensional 12 Strand DNA Activation so unique? The Interdimensional 12 Strand DNA Activation, as it was given to me by my spirit guides, is unlike any other on the planet. What makes it so different from all the other DNA activations? • It activates the 12 interdimensional layers of energy that surround the DNA, connecting you to the 12 dimensions that are accessible to us now at this point in our evolution. • You participate in the activation, experiencing the energy of it and making it more powerful. You'll be gently and carefully guided through the process by me and I'll be connected to your energetically to ensure that your activation is successful. • The Interdimensional 12 Strand DNA Activation utilizes color and sound. The vibrations of the sacred open the receptors of your cells, allowing the activation to more easily be imprinted on the DNA. Sound sets the vibration of the body at the correct rate to receive the activation at each level. The energy vibration of colors adds to the power of this activation. The benefits of this activation (the purple text is verbatim from my spirit guides) are: • Thirst for clean water. The activation creates new electromagnetic connections of higher vibration in your body. Liquid is needed in order for them to work optimally. Your body will be working with a greater number of electromagnetic connections and needs to be properly hydrated to ensure clear, strong communication between you and your spirit guides. • Hunger for pure food. Your cravings for food will change to those that are more pure and have a greater nutritional content, such as organic and raw foods. This process will be effortless, almost seeming to be automatic. • Greater health. As you shift your eating and drinking habits to include healthier choices, your body will respond by having greater health. In addition, the vibration of your physical body will be of a higher frequency, making it incompatible with the vibration of illness. • Inner peace. This may be experienced as calmness, unwillingness to engage in drama - either from other people or within yourself, being more grounded and centered, emotional stability • Greater energy. The increased number of electromagnetic connections within your body will enhance the natural flow of energy throughout all your physical systems. • More clear connection to God/spiritual guidance. The activation of the 12 DNA strands is a reconnection to your true Divine Self. • Connection to all living things. This means ALL living things - plants, trees, animals, devas, nature spirits, Gaia. • Connection to other dimensions. You'll be able to connect more easily to higher dimensions for spiritual wisdom. You are a multidimensional being, residing in many dimensions other than this, the third dimension. What you call your Higher Self is often you, in another dimension. The Interdimensional 12 Strand DNA Activation is a powerful process that is similar to a guided visualization or meditation in which you serve as an active participant. It includes the activation of all 12 strands of your DNA, PLUS the activation of the 12 interdimensional layers that surround the DNA, PLUS your Akashic Record which resides on your DNA. Candess’ experience with DNA Activation You may wonder about DNA Activation and what it is and what happens when you get your DNA activated. I liken it to a spiritual immune builder. We have 2 strands of DNA in our physical body and up to an infinite about of strands in our etheric body. I originally activated to 12 strands of DNA, but one day when I was in my office with a client, we simultaneously felt some energy coming down from the top of our heads. We looked at each other and said together, “We just got activated to 144 strands of DNA!” I was surprised and later called Diane Stein, whom I had been working with after connecting with the Lords of Karma. She checked in with her guides and said yes, that is correct. More recently, the Lords of Karma are activating to 144,000 DNA strands! Now, I tend to be sensible, have my feet on the ground, have a degree in Counseling Psychology from Gonzaga University and a doctorate in Clinical Hypnotherapy from American Pacific University, but I cannot help it – when something spiritual happens, it happens and I follow my path and my guidance. Although many people will not believe something until it is proven with science, I am a big believer of personal experience as well. In fact, science, which I love, is finally catching up with what we have known intuitively for many years. This is especially true with Quantum Physics! I find I am usually many years ahead, and hope that the understanding of the etheric field and DNA strands becoming activated will be main stream information in the next few years. At this time, it is important for me to assist others in becoming activated. Since my work with the Lords of Karma, DNA Activation and the Essential Energy Balancing workshops I have facilitated, my life has been incredible. I am able to manifest easily and it is much easier to move from negativity or fear into peace, love and forgiveness. The DNA Activation and Essential Energy Balancing Workshops are not magic, but they do clear the karma and bring more Light into your body so that you can do the daily work of changing behaviors, practicing love and kindness, and finding joy and peace. Most people at this time are activating between 12 and 144 strands. The Lords of Karma are now activating to 144,000 Strands! The amount of strands beyond 144 are dependent upon each person. The more Light you bring into your system, the higher the strands activated. I encourage you to meditate to allow for more light. After this activation, when more strands of DNA are available, your strands will automatically activate to the new level of strands. This is a one time process. I encourage you to watch my Muscle Testing video to test the strands you have activated! My understanding of DNA is that it not only carries the code of what we look like and how our body develops, it also carries the process of all our chakras, energy bodies, and levels as well. It carries the programming for our life and our karma. Reprogramming and Reconnecting the DNA assists us in releasing issues and healing on all levels. See Essential Energy Balancing I to reprogram all of your energy bodies and to remove Earth Karma for soul development. According to Essential Energy Balancing, most of the instructions for our spiritual evolution are excluded from the two-strand DNA we currently carry. Our life on Earth originally began with 12 strands of DNA, but they were disconnected by interplanetary war long ago. The Lords of Karma are currently activating to the full complement of the DNA, which at this time is 144,000 strands. When I activated people I told them that when more strands became available, they would automatically activate. That is now happening. The Lords of Karma are activating the DNA and the amount of strands beyond 144,000 are dependent upon each person. The more Light they bring into their system, the higher the strands activated. I encourage everyone to meditate to allow for more light. Because our full complement of DNA has been disconnected (not destroyed) it can be reconnected, clearing the way for major healing on all levels and for the vital expansion of our abilities. With your full complement of DNA, your psychic abilities may increase significantly. Reconnection also makes possible the clearing of the more than fifty percent or more of karma necessary for ascension and also the energy changes that take place with ascension. Some people are connecting our human DNA with beings that are not human. When you connect your DNA to other species and beings like this, you are vulnerable to mutation in your own DNA. This can be dangerous. An example is it would be like your DNA is a specific signal or wave. If you open up to a group of signals and waves, there is room for a lot of interference and signals may get crossed. I do not advise this. There are a lot of beings who are attempting to gain power and are connecting to those who have not done the necessary 3rd dimensional work. We have done the 3rd dimensional work and are now moving into the 4th dimension. These beings who do not belong to the Earth are attempting to connect with those who are not ready to transcend and activating them along with other species to gain power. Those who get this higher activation can be more vulnerable to being controlled. We are Light Workers and we are moving into a Higher Vibration with the planet Earth. There are also beings who are calling themselves Ascended Masters that are not true. The group of Ascended Masters, the Lords of Karma I have been working with have been with me at least since 1991. I believe they have been with me prior to this incarnation. I trust them and the processes they facilitate in the DNA Activation and Essential Energy Balancing I, II, and III. When I do the activation, once you are activated the activation will continue to increase to the level that DNA has increased for people on the planet. This one time activation is all you need. Occasionally, after you have been activated with me I will email you and offer another activation and some healing processes over a conference call. I do this not because you need another activation, but because the healing processes are helpful in clearing karma and I enjoy connecting with those I have activated. This is a gift from the Lords of Karma. I can’t say for sure why some people feel more than others during these processes. The general reason I speculate is that those who meditate more often experience more. The reason for this is that meditation helps us to “get out of the way” and not think so much. When I do readings, the more I concentrate, the less I see and the more I can go into trance, the more I see. I also notice that when people try too hard or think too much, the ego gets in the way of receiving information. Also, people who have had many lifetimes as readers or healers also get information naturally, so please be generous with yourself and allow yourself to have your own experience. You may want to my video on kinesiology. This is a way that many people get confirmation. Also, when you meditate in a group, connecting with guides is much easier! Quantum physics gives us an understanding of non-locality which allows for healing over space and time (instantaneously). I have activated DNA for people in Canada, India, Malaysia, Sweden, Japan, South Africa, Mauritius, and many other places remotely. Deepak Chopra talks about distance healing as do many other Spiritual Teachers, Physicians and Scientists. Einstein taught us that there is no time or space therefore healing can take place in person or from afar. I especially like to activate through Skype. Please pay for your session on my website using the Cart. You can click the Buy Now button even if you don’t have a Paypal account. You can use your credit card on this secure Paypal website. Paypal will notify me of your payment. After you have paid for your session, email me with some times that work for you. You can check out the time differences through the world clock or leave me the largest city near you so I can calculate the time difference. I am in Washington State in the USA which has Daylight Savings Time. We are UTC -8 and in the Spring – Summer UTC -7. If you do not have a credit card you may pay for your session through a money order that is drawn on a United States Bank. You can email me for my address and send the money order. We can set the appointment for after I receive the money order. Generally the activation is complete in 24 hours. Most say they notice an increase of energy within an hour or so. Others say it is more gradual and a few have said they did not feel anything at all. It varies how long it takes to make the mental integration and the adjustment in the body. This is why I prefer that you either muscle test yourself (kinesiology) or have someone muscle test you prior to the activation so that you know how many strands you have activated already and are able to verify how many strands are activated after the process is complete. Using a pendulum would work as well. I muscle test each person I activate and make sure the activation has been completed. My personal process of awakening was in 1991 when I had an experience that felt like Ascension around the 11:11. Since that time, I knew my work on the planet was to help raise the planet’s vibration. Activating DNA is one way that I fulfill this commitment. Over time, when enough individuals are activated, all individuals will be activated. I have also been activating DNA and working with the Lords of Karma for many years. Many people are new at this. All the work I do with the Lords of Karma is set at a reasonable price in accordance with them. Some people feel different after being activated, but not everyone feels different. During the Activation those who meditate regularly usually have more sensations and feel more during the experience. I check with the Lords of Karma and muscle test as well to make sure you Activated. You can also learn to muscle test yourself. Watch the video on my website called muscle testing and the wording you use to test is ” I am fully activated to ___ strands of DNA.” You will get a strong test when you use muscle testing. You can start with 144,000 Strands of DNA because that is the least amount you will be activated to. After that you can move up in numbers and when you become weak, you will find you are activated to the last number where you were testing strong You may feel more of a difference after the Essential Energy Balancing workshops, so be sure to read about them and sign up. Essential Energy Balancing I, II, and III are each facilitated at least four times a year. Some people when receiving massage or other energy work such as DNA Activation experience detox symptoms. I encourage you to drink plenty of water after having any energy work done to prevent or alleviate these symptoms. General symptoms of any cleansing are sleeping more or less than usual, increased or decreased energy, headache, body aches, frequent urination, hot or cold sweats. If any of these natural detox symptoms occur, just drink plenty of water to cleanse your system. Some people also take electrolytes when they do the workshop. You can find them at a health food store or by a product such as Gatorade. Staying grounded is helpful so you may want to watch my Grounding your Energy and Manifesting Video. When I facilitate an Essential Energy Balancing Workshop, (EEB I, EEB II, or EEB III), I do this remotely for those who cannot attend during the scheduled workshops. You must be emotionally and mentally healthy to do these workshops. You can click on my Events tab on this website for the schedule of the next Essential Energy Balancing Workshop or sign up for on my email list to be notified in advance. Prior to the workshop you may want to get the book Essential Energy Balancing I, II, or III by Diane Stein, depending upon the workshop you are taking. They must be done in order with EEB I first. I will be taking you through the process remotely, but if you want to understand more, the information in the book is important. Some of the information is no longer accurate and if you sign up for the workshop and have the book, let me know and I will share with you. During the process I ask that you rest. You can move around your home reading and gardening and being still, but it would not be good to do this when you are working or too active. Generally the Remote EEB I workshop on a Friday Pacific Time in the US from 9 am – 2 pm. In other countries this may be on a Saturday and Sunday. The EEB II is a one day workshop. You can calculate the time zone difference on I am in Washington state so you can look for Seattle, Washington, USA. After the workshop, I will send you information about what to do after you have completed the process. If you have a group of 10 or more, I would be happy to schedule the workshop specifically for you! To connect with the Lords of Karma or a specific Ascended Master you can go into the theta state. To do this focus in your heart and then bring your attention out of the crown chakra at the top of your head into the heavens. Ask them to connect with you and be still and listen. When you ask questions of them you can create a symbol for how you receive a yes or no. For instance you can imagine a rosebud. If the rose opens this is a yes and if the rose wilts this would be a no. If you get a no when doing the Essential Energy Balancing Processes, you can ask them what you need to do first and then listen. If you don’t get this information it may come with practice. I find you have to be receptive and not think too much, but rather soften your gaze and receive. If you still cannot do this, you may want to practice meditation for awhile to quiet your mind. Merchants are subject to change. Prepaid cards issued in connection with loyalty, award or promotion program. Blackhawk Discover® gift cards and prepaid cards are issued by MetaBank®, Member FDIC. Discover® and the Discover Acceptance Mark are service marks used by MetaBank under license from Discover Financial Services. In Canada, Mastercard Prepaid Cards are issued by Peoples Trust Company pursuant to license by Mastercard International Incorporated. ®/TM Mastercard is a registered trademark, and the circles design is a trademark of Mastercard International Incorporated. Get ZTE Z223 support for the topic: Activate AT&T PREPAID account. Find more step-by-step. To activate your AT&T PREPAID account from your phone, insert your AT&T PREPAID SIM card into the phone. Note: If you do not have a. To activate online, go to www.wireless.att.com/activations. Note: Once your account is. GoPhones are prepaid AT&T cell phones. If these phones are not reloaded with a service card prior to the service end date, they are deactivated. If reloaded within 60. Activate your prepaid, no annual contract cell phone. Everything you need to get started with your T-Mobile pay as you go mobile phone. Easy online setup guide. ![]() ![]() In the United States, Mastercard Prepaid Cards are issued by MetaBank, Member FDIC, pursuant to license by Mastercard International Incorporated. Mastercard is a registered trademark of Mastercard International Incorporated. ![]() In Canada, Visa Prepaid Cards are issued by Peoples Trust Company pursuant to a license by Visa Int. *Trademark of Visa Int., used under license. In the United States, Visa Prepaid Cards are issued by MetaBank, Member FDIC, pursuant to a license from Visa U.S.A. The information on this site has been translated into French and Spanish for your convenience only. The translation may not accurately represent the meanings of terms, conditions and representations presented in the English language. The English language controls the meaning of the information provided herein. For MetaBank privacy policy, visit For patent information, visit ©2017 Blackhawk Network Holdings, Inc. All Rights Reserved. Merchants are subject to change. Prepaid cards issued in connection with loyalty, award or promotion program. Blackhawk Discover® gift cards and prepaid cards are issued by MetaBank®, Member FDIC. Discover® and the Discover Acceptance Mark are service marks used by MetaBank under license from Discover Financial Services. In Canada, Mastercard Prepaid Cards are issued by Peoples Trust Company pursuant to license by Mastercard International Incorporated. ®/TM Mastercard is a registered trademark, and the circles design is a trademark of Mastercard International Incorporated. In the United States, Mastercard Prepaid Cards are issued by MetaBank, Member FDIC, pursuant to license by Mastercard International Incorporated. Mastercard is a registered trademark of Mastercard International Incorporated. In Canada, Visa Prepaid Cards are issued by Peoples Trust Company pursuant to a license by Visa Int. *Trademark of Visa Int., used under license. In the United States, Visa Prepaid Cards are issued by MetaBank, Member FDIC, pursuant to a license from Visa U.S.A. The information on this site has been translated into French and Spanish for your convenience only. The translation may not accurately represent the meanings of terms, conditions and representations presented in the English language. The English language controls the meaning of the information provided herein. For MetaBank privacy policy, visit For patent information, visit ©2017 Blackhawk Network Holdings, Inc. All Rights Reserved. BlackBerry Internet Service provides business users of BlackBerry devices with Internet capabilities and virtual real-time delivery of email and messaging services, using push technology. You can establish up to 10 email accounts to keep users abreast of news and developments, as well as providing a centralized location in which to track business activity. The feature may be activated using one of three methods, either on the device itself or from the PC. Unlike its counterpart, the corporate-owned BlackBerry Enterprise Service or BES, wireless carriers operate and manage the service. ![]() ![]() ![]() I have an LG Voyager and was given a Blackberry Curve. What do I need to do to activate the Blackberry? Is there a charge? I alsoknow I will have to. I just bought a BlackBerry Curve 8530 over the weekend and I am trying to configure the phone for my company email. My company is asking me to do. ![]() ![]() ![]() My soul, corrupted by vengeance, hath endured torment to find the end of the journey, in my own salvation and your eternal slumber. -Genesis Theories Biographical information Affiliation(s) Shinra Electric Power Company Occupation(s) SOLDIER First Class Physical description Race Human Gender Male Laterality Right-handed CC FFVII gameplay details Type Boss DoC FFVII gameplay details Type Non-player character Behind the scenes information Designer(s) Tetsuya Nomura Japanese voice actor Gackt English voice actor Oliver Quinn (Crisis Core) Robin Atkin Downes (Dirge of Cerberus) More information Enemy appearances Boss Boss (final) Genesis Rhapsodos, also known as G, is a character in the Compilation of Final Fantasy VII. He is the main antagonist of Crisis Core -Final Fantasy VII- and makes a cameo in Dirge of Cerberus -Final Fantasy VII. ![]() A SOLDIER First Class born from the Jenova Project, Genesis is initially loyal to Shinra Electric Power Company wishing to prove himself a hero like Sephiroth. When he begins to suffer from genetic degradation due to his imperfect infusion of Jenova's cells, Genesis leads a rebellion against Shinra with the intent of finding a cure. Genesis is an authority on researching and interpreting the verses of the epic LOVELESS, and his obsession with the poem drives his actions as he comes to think of himself, Sephiroth, and Angeal Hewley as its three protagonists. Profile Appearance. May 25, 2009 DMW Limit Verge Activation Chances.% chance to activate. 4-25% 5-28% Chocobo mode Activation Chances With Materias equiped. Chocobo Mode Materias. Characters of the Final Fantasy VII series. She is the one who succeeds in extracting the Protomateria needed to activate. Characters of the Final Fantasy. Padawan you mofo. Are you effng kidding me? For one hrmtrchchchch, I said that Moogle Power corresponds to Aerith's limit break and by pressing and HOLDING the X button when Aerith's comes up on the DMW, you activate Chocobo Mode and only Get MOOGLE. Each Chocobo Break CORRESPONDS. Gackt wrote and performed the theme song of Dirge of Cerberus -Final Fantasy VII, 'Redemption', and wears the Genesis costume in the music video, though with a different hairstyle. Beyond this, Genesis's design bears similarities to Sephiroth, including the long coat with black clothing underneath, crossed leather straps, the SOLDIER symbol, black boots, shoulder guards, and a large sword. In Dirge of Cerberus -Final Fantasy VII- the left side of his outfit is separated into straps. Genesis is right-handed and bears a black wing on his left side in contrast to Sephiroth, who is left-handed and has a wing on his right side. Gackt had some input on the costume design, mostly to ensure it would allow for easy movement, but also to help settle on the color scheme, which had previously been intended to be either white or black. As Genesis experiences genetic degradation during Crisis Core -Final Fantasy VII-, his hair turns white and his clothing lightens to white and gray, his wing turning a lighter shade of black. Personality Infinite in mystery is the gift of the Goddess. We seek it thus, and take to the sky. Ripples form on the water's surface. The wandering soul knows no rest. Genesis quoting LOVELESS Act I Crisis Core -Final Fantasy VII- portrays Genesis as a deserter, arrogant and prideful. Being adopted, Genesis feels betrayed by both his true and adoptive parents, and his main source of turmoil comes from discovering the secrets of his birth that leads him to resent Shinra and all those associated with it. He takes pride in the handsome figure he cuts, his fighting style, and the popularity they garner him, but does not enjoy mingling directly with people, and only opens himself up to his companions, Sephiroth and Angeal. Although he considers Sephiroth a friend, Genesis envies him. Genesis is obsessed with LOVELESS, a famous poem that has been adapted into numerous plays. According to the Genesis fan club 'Study Group' Genesis first read LOVELESS at a young age and it became his favorite, and he has spent his life trying to decipher it. Genesis takes the words of LOVELESS literally believing to have discovered its meaning; he considers himself, Zack, Sephiroth, and his friend Angeal to be characters in the poem, and believes that by fulfilling its words he can obtain the 'Gift of the Goddess' to cure his degradation. Genesis charges up his Rapier. As a First Class SOLDIER, Genesis possesses superhuman strength, speed, agility, reflexes and stamina. He is skillful with both melee weapons and magic utilizing both akin to a Mystic Knight or a Red Mage. He wields the Rapier, a large sword with a red blade, and variably uses it one or two-handed. Genesis can channel magic into his sword, endowing it with a red aura and emblazoning runic symbols along its length. Genesis makes liberal use of magic and uses spells with fire-type appearances—such as Homing, Flash, and Dark Energy—but it is unknown which of these spells are cast using Materia and which are an extension of his Project G abilities. He also uses Summon Materia to conjure monsters to battle Zack. Artwork of Genesis's sword. With his identity as a Project G SOLDIER known to him, Genesis manifests a black wing over his left shoulder. The wing enables him to fly, and when battling Zack he can command the feathers to fly about and use them in projectile attacks. Following his restoration at the end of Crisis Core -Final Fantasy VII-, when he is fought with his empowered Rapier, Genesis can manifest blades of red energy, but no longer bears his wing. However, based on the secret ending of Dirge of Cerberus -Final Fantasy VII-, Genesis still maintains the ability to summon his wing. Genesis's ultimate attack when fought as a restored human is Apocalypse, where he creates a crest of red energy above his opponent that emits a wave of energy to damage them. Zack learns Apocalypse as a Digital Mind Wave attack after defeating Genesis in their first battle. As a product of Project G, Genesis can copy his genetic material onto others and create copies of himself. The Genesis Copies take on his appearance, the degree of which depending on how strong the copy is—the strongest copies appear identical to Genesis save for his weapon. As he is not a perfect specimen his degradation passes on to his copies, hampering their abilities as they lose power. Unlike Angeal, Genesis cannot imbue monsters with his abilities, nor can he take on the abilities of those imbued with his cells as Angeal does when he becomes Angeal Penance. Story Crisis Core -Final Fantasy VII- FFVIICC. The world needs a new hero! Genesis to Sephiroth before the VR room fight Genesis was born from the Jenova Project G led by Dr. Gillian Hewley was injected with Jenova's cells and her cells were transplanted into Genesis to grant him Jenova's abilities, an extraterrestrial organism Shinra scientists mistook for a member of the Cetra, a race of ancient humans said to have been able to commune with the planet itself. After Genesis's birth Professor Hojo's 'Project S,' which created Sephiroth, was deemed superior, and Project G was shut down. Unknown to Hojo and Hollander, however, the Project G research would continue in Deepground. Genesis was labeled a failed experiment and was adopted by a wealthy landlord in Banora. Genesis and Sephiroth in combat. Genesis and Angeal were childhood friends despite Angeal's family being poor. During the Wutai War Genesis envied Sephiroth's fame, and he and Angeal left for Midgar to join SOLDIER. The two became 1st Class and were close with Sephiroth, the only two he socialized with in the company on a personal level. During a training exercise between the three Genesis challenged Sephiroth to a one-on-one duel that escalated to the point Angeal had to intervene. Genesis broke Angeal's SOLDIER sword with his Rapier and the top sliced into his shoulder as it shattered. Genesis assured the two it was a minor wound, but it worsened rather than healed, having triggered Genesis's flawed genetic structure to begin to degrade. Hollander, knowing the secrets of Genesis's birth, claimed he could heal him. Secretly, Hollander desires vengeance on Hojo and Shinra and wants to prove Genesis the superior product of the Jenova Project. Under Hollander's orders, Genesis took a large force of 3rd and 2nd Class SOLDIER members and went rogue during the closing stages of the Wutai War. Hollander vanished, taking with him the technology to produce Genesis Copies. By transplanting Genesis's cells into the SOLDIER members who had followed him, Hollander would grant them Genesis's appearance and abilities, and the two began to build their army. A month later SOLDIER director Lazard sends Zack and Angeal to Wutai to assist in the siege of Fort Tamblin and to investigate Genesis's disappearance. During the attack Angeal goes missing and Zack is assaulted by Genesis Copies. Zack is dispatched with Tseng, the leader of Shinra's intelligence agency, he Turks, to Banora to question Genesis's parents. The town is overrun with Genesis Copies as well as stolen Shinra robots, and during the investigation Tseng finds a fresh grave with Genesis's adoptive parents, killed by their foster son. Genesis at Banora Village, with his wing visible. In the apple juice factory outside of town the two find Genesis who incapacitates Tseng. Angeal appears and stops Zack from striking him as Genesis leaves, then follows him. Zack returns to the village and finds Angeal's mother, Gillian Hewley, dead, and assumes Angeal killed her. In reality, she took her own life in shame for taking part in the Jenova Project. Genesis tells Zack and Angeal that Angeal can no longer live in their world and trips Zack as he tries to chase after his old mentor. Genesis summons Bahamut to fight Zack, and after Zack defeats it, Genesis unfurls a large wing from his left shoulder. He tells Zack that he and Angeal are monsters, and flies away leaving Zack and Tseng to evacuate as the town is destroyed by Shinra to cover up Genesis's actions. Shortly after, Genesis and Angeal are declared killed in action. In Midgar, Lazard tells Zack (now promoted to SOLDIER 1st Class) and Sephiroth that Shinra plans to continue to fight Genesis and his forces out of the public's eye when alarms sound an intruder. The building's security drones have malfunctioned and Genesis Copies are attacking the Shinra Building. As Zack helps fight off the army Sephiroth contacts him and tells him Angeal has been spotted in the Sector 5 Reactor. The two find Hollander's lab with evidence of his hand in creating the Genesis copies and information on Project G. Hollander and Genesis arrive, and Zack chases Hollander as Genesis speaks to Sephiroth, claiming Sephiroth's glory and fame ought to be his. He cites a passage from LOVELESS and asks Sephiroth which of them would be the Hero spoken of in the story, and claims his desire is to obtain the 'gift of the goddess' LOVELESS speaks of. Angeal interrupts Zack's pursuit of Hollander and reveals two white wings of his own. Wishing to be returned to normal, Angeal has allied with Genesis and Hollander to be cured. As Zack refuses to fight his old mentor, Angeal knocks Zack off the platform sending him plummeting into the Sector 5 Church in the Midgar Slums. Angeal tries to persuade Genesis not to kill Hojo. The attack on Shinra continues and Zack returns to the plate to help defend the city. Angeal reappears with a change of heart, and flies him to the Shinra Building. Sephiroth and Angeal repel the Genesis Copies and send Zack to protect Hojo. Genesis, Angeal and Zack congregate in Hojo's lab where Genesis quotes from LOVELESS and the group discusses the poem's missing fifth act that leaves the result of a climactic battle between friends uncertain. Genesis flees and Zack and Angeal follow. Angeal abandons Zack to fight Bahamut Fury summoned by Genesis, who has also taken his leave once Zack defeats it. News of a base used by Genesis in Modeoheim come in. Zack and Tseng, accompanied by another Shinra infantryman and Cloud, investigate, and find Genesis in a Mako excavation facility. Zack finds Genesis confronting Hollander, now degraded to the point his clothing and hair have begun to turn white. Genesis has decided Hollander is useless, failing to help his condition, and declares to seek Jenova cells for a cure. Hollander protests that no one knows where Jenova is, and Genesis says he will destroy the world along with himself then. Genesis duels Zack and is defeated, and throws himself into the depths of the Mako Reactor to his apparent demise. Several months later the Genesis army resurfaces and attacks Shinra across the Planet. Zack and Sephiroth assist in defending Junon where Hollander is being held captive. During the attack Hollander escapes with the assistance of two Genesis Copies. Though unseen by Shinra, Genesis observes the events from atop the Mako Cannon, alive but still degrading. When Sephiroth and Zack are dispatched to Nibelheim to investigate the local reactor Genesis confronts Sephiroth at the reactor's core. He tells Sephiroth about the two Jenova Project branches, G and S, and that as Angeal was the perfect 'monster' of Project G, Sephiroth is the product of Project S. Genesis tells Sephiroth the origins of his 'mother,' Jenova, and her hand in their creation. Claiming that Sephiroth is the perfect product of Jenova's cells, Genesis says this means his cells will never degrade and asks Sephiroth to give him his cells to cure his degradation. Sephiroth, confused and angry, refuses, and Genesis departs. His words, combined with what Sephiroth learns about his origins in the Shinra Manor, spark his descent into madness, and he burns Nibelheim to the ground and is seemingly killed by Cloud within the reactor. Genesis stops Zack's journey across the bridge. After four years of captivity in the aftermath of Nibelheim's destruction, Zack and Cloud break free from Shinra Manor and escape, being pursued by two Genesis Copies. As Zack prepares to face off with them the real Genesis soars down from the sky, explaining he heard Zack was being used for one of Hojo's experiments, Project S, and so Zack holds Sephiroth's cells that can cure him. One of the Genesis copies consumes a lock of Zack's hair, but it mutates into a monster and Genesis leaves. When Zack makes his way to Gongaga more Genesis Copies attempt to kill him, but are stopped by Genesis and Hollander, now also a degrading Genesis Copy. Believing Zack's body rejected Sephiroth's cells due to being a SOLDIER member, they now seek Cloud and the cells he carries. Genesis declares to have discovered the true final act of LOVELESS and flies away as Hollander and the copies search for Cloud. Zack dispatches Hollander and meets Lazard, an Angeal Copy, who directs him to Genesis's lair, the caverns beneath Banora. Zack discovers the journal of a younger Genesis before his days as a SOLDIER that describes his invention of Banora White apple juice, along with his desire to share his accomplishments with Sephiroth by having him eat a Banora White. Deeper in the caves Zack finds the story of LOVELESS carved to stone tablets and Genesis before a goddess statue holding a gigantic natural Materia. Certain that the Goddess Materia is the 'gift of the goddess,' Genesis quotes LOVELESS again. With Zack's arrival, having inherited Angeal's Buster Sword and Sephiroth's cells, the three friends are reunited and LOVELESS is fulfilled. Believing himself the Hero who has received the goddess's protection Genesis absorbs the Materia's power to become Genesis Avatar and engages Zack. When defeated Genesis is returned to human form, cured from degradation. Zack figures that all Genesis wanted was to regain his pride as SOLDIER, and be healed of his degradation. Gathering the last of his strength Genesis challenges Zack to a final duel as a SOLDIER, and is struck down. Genesis speaks to Zack before transforming. Genesis is sent flying back with Zack's final attack and lands on his feet in a place flooded with Lifestream. The goddess statue in the distance morphs into Minerva who sees his desire to complete his duty as SOLDIER, and as the will of the Lifestream, spares his life. Zack carries the weakened Genesis out of the cave. Zack lays him down and retrieves three Banora Whites, taking a bite out of them to fulfill Genesis's childhood dream, though he apologizes for not being 'the real thing.' Zack asks if the apple is the 'gift' but Genesis shakes his head; thanks to his battle with Zack Genesis discovered the gift is the pride of a SOLDIER. Content with his pride restored and his dream fulfilled, Genesis passes out, and Zack and Cloud move on. A Shinra helicopter takes Genesis away. Shortly after Zack and Cloud leave a Shinra helicopter lands nearby and two 1st Class SOLDIER members with Deepground symbols on their belts jump out. They wonder if Genesis would join them and carry him into the helicopter leaving his book of LOVELESS behind. Genesis's voice recites the final act of LOVELESS that appears onto the book. Dirge of Cerberus -Final Fantasy VII- FFVIIDoC Sir. I've been spending time analyzing the data retrieved from the files of former weapons development administrator Scarlet. It used to be a medical facility for injured SOLDIER troops. Military personnel would be sent there for care and rehabilitation. However, over time, it evolved into a laboratory for madmen content on ignoring all laws of man and nature. And supposedly this evolution took place because of the existence of one rogue SOLDIER—a man known only as 'G.' However, that's all we were able to retrieve. WRO Personnel onboard the Shera. Genesis, as he appears in the secret ending. Genesis was brought to Deepground and the two SOLDIER members, Weiss and Nero, attempted to persuade him to join in their rebellion against the Restrictors, current leaders of Deepground. Genesis declined and sealed himself in a flooded cavern beneath Midgar awaiting the day he would be needed to protect the world in Sephiroth and Angeal's stead. Vincent discovers that, according to Shinra executive Scarlet's private files, the Tsviets were spliced with Genesis's cells and subjected to various experiments to see how they reacted. Collecting the three 'G Reports' unlocks an extra ending. Following Omega's destruction, Weiss's body lays in the flooded cavern, which sends out a shock wave that awakens Genesis. Genesis approaches Weiss and tells him it 'is not yet time for slumber' and that they have much work to do. He picks up his 'brother,' spreads his wing, and flies off into the night. In the Crisis Core Complete Guide it is explained that Genesis has reappeared to protect the planet, and his final lines in Crisis Core -Final Fantasy VII- explain his return, but in more of a riddle. Because Dirge of Cerberus -Final Fantasy VII- is the last chronological entry in the Compilation of Final Fantasy VII, save for the final scenes of Final Fantasy VII: Advent Children Complete, Genesis's current status is unknown. Gameplay Boss Genesis is fought three times, first at the Mako Excavation Facility, in the process of undergoing degradation and with his wing present. The next time he is fought he is titled 'Genesis Avatar' in the Banora Underground after being transformed by the Lifestream from the Goddess Materia. Immediately after this the player fights Genesis in human form, restored to full strength. A simulation of Genesis based on his abilities in the battle in the Mako Excavation Facility can be fought in Mission 5-1-5. Digital Mind Wave Genesis is added to Zack's Digital Mind Wave allowing him to unleash Genesis's Limit Break, Apocalypse. Genesis Mode is a special mode where Genesis's portrait is added to the reel. This is the final check the game makes; if the game fails to enter both Summon Mode and Chocobo Mode, there is a chance Genesis Mode will activate. The base chance is 12.5%, but it can be boosted further with DMW Materia. Genesis Mode still doesn't mean Apocalypse will activate, just as Summon and Chocobo Modes do not guarantee a move will trigger. After Genesis Mode has been activated once, Genesis's portrait stays in the reel until it is reset, such as during a storyline event or by drinking the Potion from the Shinra employee in the Shinra Building lobby. Creation and development. Gackt, the Japanese musician/singer, on whose appearance was Genesis's modeled. Gackt's original involvement with Square Enix was singing the theme music for Dirge of Cerberus -Final Fantasy VII-, and appearing in a minor role in that game, playing Genesis. Hideki Imaizumi, the producer of Crisis Core -Final Fantasy VII, thought such a passing role was a waste, and asked for more involvement. Imaizumi and Gackt came up with Genesis's design, describing everything from his attitude to his clothes. 'I went to eat with him one time and described the Final Fantasy VII universe in rich detail. And it turned into this process of collaboration, creating the character together. Then we went to the studio and recorded the Japanese voice with all that in mind. So he really was a creative partner in all of this. And we really wanted the connection between Dirge of Cerberus and Crisis Core.' [1] Voice In the Japanese versions of Dirge of Cerberus -Final Fantasy VII- and Crisis Core -Final Fantasy VII-, Genesis is voiced by Gackt. In the English version of Dirge of Cerberus, he is voiced by Robin Atkin Downes, and in the English version of Crisis Core, Genesis's voice is provided by Oliver Quinn. Etymology and symbolism Genesis originally being known only as 'G' likely refers to Gackt who played him. Genesis is a Greek term meaning 'birth' or 'origin'. Book of Genesis is the first book of the Old Testament. The Fruit of Knowledge that caused Adam and Eve to fall from Eden is often depicted as apple, and Genesis often carries one with him, and it is used as a symbol of temptation as he offers it to people he wishes would join him. Similarly, Genesis was the first to learn about the 'sin' of the Jenova Project, but unlike Sephiroth, achieves salvation, as well as spiritual and physical healing, from the Gift of the Goddess. Rhapsodos is 'one who performs an epic poem', a rhapsody, such as the poet Homer. Thus, Genesis's name may be interpreted as meaning 'the original performer of the epic poem', which could refer to his desire to reenact LOVELESS, or his rebellion against Shinra that Sephiroth would repeat years later. Trivia According to the Crisis Core Complete Guide,[2] Genesis's fanclub, titled Red Leather, is sponsored by his foster parents in Banora. Despite initially seeing their task of raising Genesis as a mere job from Shinra, their affections for him grew over time. The Crisis Core Ultimania Scenario Q&A[3] details that the remains of the abandoned Banora mine were used as a 'secret base' or child's playground by Genesis when he was young. The Crisis Core Complete Guide explains that the desk installed there, the one the player views when first entering the Banora underground, was Genesis's desk from his childhood. Items found here include a trophy cabinet, containing the prize for winning the 'National Agriculture Awards, Processed Foods Category', scattered photos from Genesis's youth, and a book that appears to be his journal. I still need to defeat the shadowseer and the hell wyrm before I face Yiazmat. I shut it down for now though and i'll do it later. Upgraded Vaan to the Ragnarok and got the spells I never went in bought (scathe, ardor, and renew). I plan to finish my marks before I go after my last two espers: Ultima and Zodiark. After that I guess all that's left is to top off my sky pirate den, finish the ingame bestiary, and defeat Vayne in the pathetically easy fight it will be. After that I will either hook up my gamecube and play crystal chronicles or hook up my SNES and play Zelda: Link to the past, that I recently found. And I may fire off a round on my SNES copy of Chrono Trigger. Okay, it beings in Midgar with an attack on a Mako reactor. It gets blown up. While escaping, Cloud see Aerith for the first time, anyway, you continue to run, and end up back at 7th Heaven (AVALANCHE HQ). On the next raid, due to a mistake by Jessie, they get caught on the train and have to escape, they do, and go to attack the reactor. All is going well, when they get stopped just outside after setting up the bomb. Cloud falls, and crashes into Aerith's flowerbed in the Church. She hires him as a bodyguard. They escape the Turks and Aerith gets home. Cloud is told by Aerith's adoptive mother to leave without her. However, on the way to Sector 7, Aerith catches up to him, he is left with no choice by to let her accompany him. At the park, we see Tifa taken away in a carriage, where Cloud goes to save her, with Aerith's help. Basically, they infiltrate the mansion, with a little crossdressing from Cloud, and catch p with Tifa. Upon some interrogation, they find out something about Shinra, and are dropped through a trapdoor into a sewer. Blah Blah nothing important here. Back at Sector 7, they warn of Shinra's plan to drop the upper city part onto the Slums, since they know AVALANCHE's HQ is there. In an attempt to save it, Biggs, Jessie and Wedge are dead, with Cloud and Tifa meeting Barret up at the top. They, inadvertedly, set off the bomb, and Aerith, alongside Marlene is captured. During an attempt to save Aerith, they meet Red XII (Nanaki), and find Jenova has escaped. When they reach the president, following the blood. They find him dead, with Sephiroth's Masamune in him. Aerith, Barret, Tifa and Red XII go ahead, while Cloud goes after Rufus. Rufus escapes on a helicopter, and Cloud and Co have to escape. Motorcycle highway battle. In the end, they end up outside Midgar, and are unable to go back in. This is a detailed summary of the Midgar portion. So the last portion dealt with Midgar, they then move onto Kalm. In the Inn, Cloud tells his story of Sephiroth. It beings in Kalm, Cloud tell his story in the Inn there. The story starts on the way to Nibelheim, 5 years ago. A rather energetic Cloud, on his first mission as a First Class SOLDIER is riding in the back of a truck, with Sephiroth and two Shinra Grunts. Of course, this is wrong, Zack is the First Class, and Cloud is one of the Grunts. Tifa knows Cloud was not there (well, he was but she didn't see him) Anyway, for the fun of it, in the flashback, you can visit Cloud's house, where he has a conversation, rather broken, with his mother, go to Tifa's house and read her letter, play the piano, and look through her drawers. So the main part, they spend the night in an Inn, Sephiroth at some point goes to Shinra Mansion where he learns of how he was created from the Jenova cells being injected into his mother's womb, while he was a fetus (Mother is Lucrecia). Of course, he continues on with the mission, and takes a picture with Cloud (Zack), Tifa and himself, for one of the residents there. When they get to the reactor, Cloud (the grunt) keeps Tifa out of it, and Cloud (Zack) goes in with Sephiroth. Sephiroth then sees the humans being given extreme amounts of Mako energy, and turning them into monsters. Knowing he was exposed to Mako Energy too, he begins to question himself (am I a monster). Anyway, they pretty much leave etc. Sephiroth ahead, and he ends up burning down Nibelhiem. Cloud (Zack) and Cloud (Grunt) end up back at the reactor, following Sephiroth. Tifa is already there, mourning her father, killed by Sephiroth. She takes his Masamune, and goes after him, this does not go well, and she ends up being attacked with it. Cloud (Zack) moves her slightly against a Reactor, and goes after Sephiroth, since it is from how Cloud knows it, he sees Sephiroth take the casing off of Jenova, and well, is injured. Now, I am going to skip ahead of the story a bit and tell the next part. Cloud (Grunt) takes off his helm and takes the Buster Sword. He then impales Sephiroth with it, and is in turn, stabbed with the Masamune. Sephiroth walks away, Cloud, not fully dead, then goes after Sephiroth and finally 'kills' him, when Sephiroth is thrown into the pool of Mako Energy, with a damaging wound. Life Mage, as your suggestion, I have added hide tags, and I've put the next part up. Okay, I'll gloss over slightly what happens after Kalm. You take a Chocobo over the Marshes to avoid the Midgar Zolom, when you reach the cave, you see it impaled upon a tree, only Sephiroth could have done this. At the end of the cave you run into the Turks, and, before anything happens, they have to leave. Nothing major said here really. So at Junon, the goal is to infiltrate the Shinra city up top. First, Cloud and Co save a girl, who has been attacked by a monster (which they witness, and kick its arse.) Cloud performs CPR and she provides a way up top, by jumping with a Dolphin. Anyway, Cloud gets in and is mistaken for a Shinra Grunt out of uniform. He's made to perform in a parade, and at the end, entertain Rufus Shinra infront of the boat. Anyway, Rufus gets on, and they all bugger off, letting Cloud and Co board the boat. On the boat, you talk to the party and such, and the player wonders how stupid they can be not to notice Nanaki's tail. Anyway, when Cloud finds Barret, they see Rufus and Heidiegger (spelling?) talking, I can't remember the conversation, but Barret is getting annoyed. The alarm goes off. Barret thinks they have been found, but there is an announcement of a Black Cloaked Man (Sephiroth), you form a party, and find nothing in the engine room, there you are ambush by Sephiroth, well sort of, it's more his will and Jenova. You have to fight, and beat Jenova here. Once that's done, the boat continues on to its destination, Costa del Sol, where you can see Hojo, witness an interesting scene with Barret, or stare at chicks in bikinis, if your are like that, and see a scene with Tifa and some guy. Basically, you spend the night at the Inn, and then set out for Mt Corel (I do not remember exact spelling.) This is my last addition for tonight, tomorrow I will continue as far as I can from where I have left off. Started playing Crisis Core again. Currently at Modeoheim and got horribly raped by Angeal twice. So I'm stuck attempting to level on missions so he doesn't 1 hit me. Though as a bonus, twice yesterday I got 2 levels in two rolls. Though the game has a way of annoying me. I keep getting stuff on the DMW when I don't need. Multiple times I've got 3 of someone just to deal the last hit when it stops. Once I even got the Summons DMW when I was about to get Aerith (meaning I would have doubled my HP to over 3k cause I had already broken the limit). Anyway, it's a fun game, though it's a fan of overkill too much. I never get the DMW to activate on harder monsters, yet on weaker ones, I'll get Lvl 5 Apocolypses, Cloud (forgot the name for his), Omnislashes, Angeal (again, forgot name) and Air Strikes. Though my main problem is with some monsters, as long as you get the hit in, they'll mostly flinch and never get a hit in. Another problem is how easy spells are to dodge. I've had Thunder spells go over my head, Blizzard spells, well, if you get hit by one, you're hopeless and Fire spells, well, they're the most troublesome to dodge. I'd have liked a balance somewhere between Fire and Blizzard spells, where you can dodge, but it takes some effort. Though, I feel that the CPU could do a better job of dodging, and not turning around letting me get 3+ hits into their back, killing normal monsters, and dealing some good damage against the harder ones. EDIT: Anyone mind telling me how Pheniox Downs work on this, and some tips for Angeal in the Bathhouse? Cloud does Meteor shots, it's also his last limit break before omnislash I believe. Phoenix downs give you the auto life ability (I got real familiar with them during the Minerva fight). As for Angeal, regular attacks to his side and just dodge well and heal. And that's side, not back. He has a special attack for you if you go around to his back. The first time I fought him I had to train too. Right now i'm letting my secondary party train up (too lazy to do it myself). I think 30-50 should be good enough. Today I fight Yiazmat, then I go after the last two espers I need, finish the sky pirates den and Finish the ingame bestiary, oh and obliterate Vanye because he is going to be really easy. Beat the hell wyrm yesterday. Annoying but manageable, like always. Thanks for the advice. I had the idea of using something which cancels out Lightning based attacks, hoping I could attack him from the back without getting raped. Anyway, I spent most of it in critical, and I finished him off with a Lv. 4 Rush Assault while in Critical. Didn't need to use the Pheniox Down, but I did to be safe, since he used to rape me with his Judgement attack, though it was only doing 1.7k damage. My main problem was if I was near him, he'd follow up with an attack to finish me, or I got killed when attacking from behind. I got the highest Clan Rank in FF12 today - Order of Ambrosia. Those rares took me forever to hunt down but I finally did it. Now everyone in my main party is level 99 and everyone else is 90+. Things that are still on my to-do list: Get everyone to level 99, get every piece of equipment, finish the bestiary by getting all the extra pages, and do the 100 tier race then I'll have a perfect game. Unless you count getting the maximum amount of everything but that's just overkill. I don't have 10 years at my expense to get 99 Danjuros. I don't even have one yet. I'm on Yiazmat right now and i'm taking my time. (that's a lie, his defense is killing me and it's taking me awhile to burn through it) I'll have it done soon since I have him a little under halfway. I should try doing him in one run though. Too bad he's not like the hell wyrm who was very generous with his invert attack and gave me mp when I needed it. So basically nothing new with Yiazmat. Still hard to beat, still uses cyclone, still kills a fully bubbled character within five attacks Oh and I have a spare dragon whisker if you need one. Yeah his defense was ridiculous for the amount of HP he had. And it gets to a point where buffing your characters (even bubble) is just a waste because almost everyone dies within one attack anyways. The Reverse spell was pretty useful, although it goes away way too quickly. I thought Omega was much easier than Yiaz. I'm trying to get Danjuro. Been trying for two days straight and no luck. I saw a video of someone with 99. Why the hell do I have the worst luck with video games? I thought my bad luck was only present in RS but apparently it is for this game too. I turned off my buff gambits and my healing except for arise or else my characters are so busy healing they can't get in any damage. Traded in my Hermes sandals for bubble belts on all my characters and put the Hermes sandals on my secondary party because if I use them it's my main party dieing and running out while reviving my main party, so haste helps. Six full bars left and about 95% of the 7th. I had only store bought ninja swords so I took a break to get some others. Fran has the koga blade (equipped the weakest one i'm using on my strongest character), Ashe has the Orochi because i'm too lazy to going for the best ninja sword, Vaan has the Antres with the dark shot. They all have Renewing Morions which takes care of sap and then my melee fighters use the Maximillian or the windbreaker. I'm sure I don't need to tell you the use of the windbreaker. I was using Mirage Vests until he used growing threat. My characters usually survive about three hits before they are dead assuming his attacks don't inflict death. ![]() ![]() A: The payments industry is more complex than ever. With new devices and technologies emerging in a connected world, the industry's finite supply of BINs is reaching current capacities. The International Organization for Standardization (ISO) which has published ISO/IEC 7812 to define BINs, and the American Bankers Association which is the registration authority managing the numbers, has a limited supply of unused or unallocated numbers. So, the industry needs more BINs to manage industry growth. A: Mastercard receives ATM location information from financial institutions. If an ATM location or a specific country is not listed, then information is not available. We continue to work with financial institutions to provide you with the most up to date and accurate ATM location information. You may want to contact the financial institution that issued your card for assistance concerning ATM locations, personal account withdrawal limits and restrictions, local currency cash advances, currency conversion, exchange rates or other services offered. You will find their contact information on the back of your Mastercard and on your billing statement. Or you can visit the financial institution's Web site. A: If you have a problem using your card at an ATM that carries the Mastercard, Maestro or Cirrus brand mark, we will investigate. Please provide as much of the information below as you can: • Your financial institution and any brand marks on your card • All brand marks on the ATM • The address of where the ATM is located, including City, State/Province and Country/Territory • ATM financial institution name (identified on the ATM) When you have the information handy, call 1-800-Mastercard (1-800-627-8372). You may withdraw cash against the balance on most Mastercard prepaid and gift cards at any ATM. However, not all prepaid and gift card issuers allow ATM or foreign transactions. Be sure to check with your card issuer to ensure that these types of transactions are permitted. Most Mastercard credit cards also allow you to obtain cash advances at an ATM. You will need a Personal Identification Number (PIN) to withdraw cash. You can find your issuer's contact information on the back of your Mastercard and on your billing statement. Or you can visit the issuer's Web site. A: Bill pay is an arrangement you make with your selected service provider(s), so you will need to contact each provider directly to arrange payment amounts and scheduling. Typically, the biller will ask for your Mastercard account number and the expiration date. For automatic bill payment, the biller may also require the payment amount it is authorized to automatically charge, and the specific date you wish to be charged each month. Note: Not every service provider/biller will allow you to choose this date. And, some service providers may require additional information, such as your signature. A: Mastercard appreciates the concern and diligence you are taking to protect your finances as it relates to credit cards and the inquiry regarding a card account breach that has impacted you directly. We take each card breach occurrence very seriously and work closely with investigative agencies. Additionally, Mastercard has increased penalties to processors to help ensure each of these companies protects cardholder data with extreme care and diligence. ![]() Did you just receive a new DBS/POSB Credit card, Debit card or ATM card? You need to activate the card before you can use it even if the card is a replacement. Specific to card breaches, Mastercard cannot determine which merchant transaction caused a card breach since this data is not generally provided to us. We encourage you to contact the financial institution that issued your Mastercard for the most up-to-date information. Typically, there is a customer service number on the back of each card that you can call. A: Yes, Mastercard contactless transactions are processed through the same financial payments network that processes billions of Mastercard magnetic stripe and chip card transaction each year. Mastercard contactless security mechanisms are designed to: • Protect against counterfeit cards. • Implement an efficient anti-replay mechanism for contactless transactions. • Limit the impact of fraudulent capture of contactless data by fraudsters across all environments. Even if the customer happens to tap twice by mistake, the technology ensures that consumer is bill once. A: Try these troubleshooting steps: • Make sure the terminal and adaptors are all turned on and plugged in. A light, wording or graphics on the screen should indicate the terminal is turned on. • If your terminal is a non-integrated terminal with a separate contactless reader, make sure that the contactless reader is lit up after the transaction is registered. The light may not turn on before then. • Register the transaction again as you would for a card transaction and ask your customers to tap again. Make sure their card/device is within 2 cm (1 inch) from the terminal and you hear a beep or see a change in the light. • If your terminal is still not responding, contact the terminal manufacturer or distributor. ![]() ![]() A: The GDPR introduces several key changes to how companies collect, use, store and transfer personal data. For instance: • Definitions. The definitions of personal data and sensitive data have been expanded. The conditions for obtaining a valid consent to use an individual’s personal data are more rigorous. • Individuals’ Rights. It will be easier for individuals to ask an organization for access to their data, to correct it, move it or erase it. • Transparency. Individuals must receive detailed information about how their data will be collected, used, shared, transferred and retained. • Privacy by Design. Companies must embed privacy into the design of their products and services throughout the whole product development lifecycle. • Accountability. Companies must document their data processing activities, data flows and compliance as well as their risk and impact assessments. • Processors and Sub-Processors. Processors have direct obligations and liabilities under the GDPR, and must be authorized by the Controller to use Sub-Processors. • Data Transfers. Companies must implement a valid data transfer mechanism to transfer personal data outside of the European Union. Contracts must include mandatory provisions and clarify roles and responsibilities of each party handling personal data. • Data Breach. Companies are required to notify data breaches to supervisory authorities within 72 hours of awareness and, in some cases, to affected individuals. If companies don’t meet the obligations of the GDPR, they will now face fines of up to 4% of their global annual turnover. The above changes are discussed below in more detail. A: Personal Data is defined as any information relating to an identified or identifiable individual (“Data Subject”). An individual can be identified directly or indirectly by reference to an identifier such as: • Name • Email address • Identification number – including PAN, social security number, government issued identification number – as well as any other unique number issued to an individual. • Location data • Online identifiers – including IP address, cookies, web beacons, pixels, etc. Even though one data type in itself might not reveal an individual (e.g., a postcode), it may become personal data if used in combination with other data types (e.g., mobile number, IP address, etc.). A: Pseudonymization means the processing of personal data in a manner that the personal data can no longer be attributed to a specific individual without the use of additional information. Pseudonymized data is still considered as personal data under the GDPR, but pseudonymization is encouraged as a privacy-enhancing measure. Anonymization means the processing of personal data in a manner that the personal data can no longer be attributed to an individual. This is a higher standard than pseudonymization as the anonymized data cannot be reverse engineered and linked back to the individual. Anonymized data is not considered as personal data under the GDPR. A: Under the GDPR, the responsibilities of the parties involved in the data processing activities differ depending on their role. A company can play three main roles: • Data Controller: Entity that defines the means (how) and purposes (why) of the data processing activities. It is mainly responsible for compliance with the GDPR. • Joint Controllers: When the purposes and the means are jointly defined by two or more entities, these entities are Joint Controllers and are jointly and severally liable under the GDPR. • Data Processor (or Sub-Processor): Entity that processes personal data on behalf of and under the instructions of a data controller. It must comply with the controller’s instructions and with a (limited) number of obligations imposed directly by the GDPR. A: To comply with the GDPR requirements, consent must meet strict requirements it must be: • Clear, affirmative and unambiguous. The individual must provide consent by way of a clear and affirmative action, such as ticking a box when registering for a service or tapping an “I Agree” button when using a mobile application. Silence, a pre-ticked box or inactivity does not constitute consent. The individual must be aware of who is collecting the data and the purposes of the processing. • Clear and plain language. Consent should be separate and not be hidden within the terms of a Privacy Notice or Terms of Use. Consent should be specific to the processing activity. Where there are multiple processing activities, consent must be given for each purpose if required. • Freely given. Individuals must have a genuine free choice and must be able to refuse or withdraw consent at any time without detriment. Consent is, however, not always necessary for processing personal data. For many data processing activities, companies can rely on other legal grounds such as performance of a contract with the individual (e.g., Terms & Conditions), a legal obligation (e.g., Anti-Money Laundering Laws; PSD2) or the company’s legitimate interest (e.g., Security and Anti-Fraud Activities). Consent would however typically be required for processing sensitive data, or for engaging in automated decision making. A: Under the GDPR, individuals have enhanced rights about how their personal data is handled. Specifically, individuals have the right to: • Have access to the personal data held about them. • Object to certain types of processing, such as receiving marketing communications. • Request correction and deletion of their personal data. • Request the transfer of their personal data in a machine readable format to another company (data portability). Individuals are entitled to make these requests free of charge and the Controller must respond to the requests within one month. However, it is important to note that these are not absolute rights and subject to various considerations before responding. Mastercard has developed an online data access portal that allows individuals, including cardholders, to exercise their rights and access, move, modify or delete their data. A: Individuals must receive detailed information relating to the processing of their personal data. This is the responsibility of the data controller and companies usually inform individuals about how their personal data is processed via a privacy notice. The GDPR increases the amount of information that needs to be provided to individuals. It also requires providing information in a concise (e.g., a layered privacy notice), easily accessible (e.g., via a prominent link on a website) form using clear and plain language. A: Privacy by Design means that privacy must be embedded into the design of new products and solutions, from the early product development phase until the product launch. Privacy by Design can be achieved by considering the following: • Data minimization. Whether the personal data is relevant and limited to what is necessary in relation to a product and/or service. • Data retention. How long the personal data needs to be kept for the product or service. • Access controls. Only allowing access to the personal data on a need-to-know basis. • De-identification. Where possible, personal data (in particular sensitive data) should be de-identified (e.g., hashed or tokenized) in order to increase the level of security and privacy (see section on pseudonymization and anonymization). Mastercard has a longstanding commitment to privacy. We embed privacy and security into the fabric of our product and our technology infrastructure design. As an example, Mastercard’s Digital Enablement Service (MDES) replaces the account number with a digital token, thereby enhancing electronic payments’ security and individuals’ privacy. A: The GDPR requires companies to be accountable, which means that they need to comply with the GDPR requirements and be able to demonstrate compliance. Practically, there are many ways to demonstrate compliance, including: • Adopting data protection policies. • Maintaining records of processing. • Appointing a Data Protection Officer. • Conducting Data Protection Impact Assessment for high risk activities. • Consulting with the Supervisory Authority if needed. As an accountable organization, Mastercard is taking all the above measures to demonstrate compliance. A: One of the key changes brought by the GDPR is that it introduces direct obligations and liabilities for data processors, as well as new rules for data processors to outsource the processing operations to another processor (“Sub-Processor”). As a data processor for authorizing, clearing and settling electronic transactions, Mastercard is subject to these new requirements. We have already implemented most of the changes required in the context of our Binding Corporate Rules (see below), and will ensure that all our activities comply with the GDPR. A: The GDPR continues to restrict transfers of personal data outside of the EU unless the third country has obtained an “adequacy decision” from the EU Commission or the receiving entity has a valid data transfer mechanism in place. Mastercard has developed and implemented Binding Corporate Rules (“BCRs”) which are an internal code of conduct that defines Mastercard’s policy regarding privacy and international data transfers and has been recognized under the GDPR as a valid data transfer mechanism for both Controllers and Processors. Mastercard’s BCRs have been formally approved by the EEA data protection authorities. A copy of our BCRs is available. A: Data Controllers are required to notify a breach of personal data to the Lead Supervisory authority within 72 hours of awareness, unless the breach is not likely to create risks for the individuals. In addition, the personal data breach must be communicated to the affected individuals without undue delay where the breach is likely to create a high risk for the individuals. Data Processors must communicate any breach to the Controller without undue delay, and must assist the Controller in complying with its notification obligations. The Article 29 Working Party – body composed of all EU data protection authorities – will issue guidance on the data breach notification requirements by the end of the year. Mastercard has a robust Incident Response Program in place. We will monitor regulatory developments in this area and will make sure that our Program meets the GDPR requirements. A: If your question is not listed, your best option is to contact the financial institution that issued your account as only they have your account specific information. Typically, there is a customer service number for your financial institution on the back of each card that you can call. You can also always contact the Mastercard Assistance Center either toll free at 1-800-627-8372 or collect at 1-636-722-7111 and we can direct you to your issuer. If you believe that your question can only be answered by Mastercard: to submit your question Or email Or mail a letter to: Consumer Inquiries Mastercard International Incoporated 2000 Purchase Street Purchase, NY 10577. A: Whether you're a new or established business, card acceptance can have a positive impact on your bottom line. Here are just a few of the many benefits: • Increased Sales Consumers spend more when they're not constrained by cash on hand. You may see increased purchases of higher-margin products as well as specialty items. And customers may visit your store more often. • Higher Customer Satisfaction Your customers will appreciate the fact that you allow them the flexibility to pay the way they want to pay - including by credit or debit card. Happier customers are more loyal customers. • Faster Checkout You'll speed your customers through checkout with rapid electronic payment. No more counting change or waiting while customers write checks. • Improved Efficiency Card transactions are conducted electronically. These paperless payments can save you time and money by minimizing cash handling and payment reconciliation, giving you more time to do more important things - like managing and growing your business. • Safety With lower volumes of cash, you're less vulnerable to theft and pilfering. • Currency Conversion Electronic payments on Mastercard and Maestro-branded cards are settled in the currency in which you sell your goods and services, regardless of where the cardholder is from. So, if you sell in U.S. Or Canadian dollars, that's how you'll be paid. A: Please email our Law Enforcement Support Center. Please do not include full card numbers in email; provide only the first 6-digits of the card number. We will respond to your inquiry within 48 business hours. Please also be advised that Mastercard does not maintain accounts or establish individual customer relationships with cardholders. While banks ad financial institutions do issue cards branded with the Mastercard name and mark under a license from Mastercard, the actual relationship with a cardholder is solely that of the issuing institution. As a result, any account information is maintained by the bank or financial institution that issues the Mastercard card, and it is the bank or financial institution that also provides periodic statements, disclosures and communications to the cardholder. A: If Mastercard Zero Liability protection applies to your Mastercard, once you report your card to Mastercard as lost or stolen, no unauthorized charges should be posted to your account in most situations. We recommend that you review the next two billing statements after you report a lost or stolen card to ensure that no unauthorized transactions have been posted. If you see unauthorized transactions, please promptly contact the financial institution that issued your card. Typically, there is a customer service number for your financial institution listed on the back of the card or on your billing statement. You can also contact the Mastercard Assistance Center either toll-free at 1-800-627-8372 or collect at 1-636-722-7111. A: Whether you're the victim of credit card theft, have lost your card or just need help locating an, we're here to assist you 24 hours a day, 365 days a year. Call to speak with a representative regarding: • Lost or stolen cards • Emergency replacement cards • Emergency cash advances • How to locate an ATM that accepts Mastercard, Maestro and Cirrus brands • Questions about applicable card benefits Emergency Contact In the United States: 1-800-Mastercard (1-800-627-8372) for a list of all emergency contact numbers. For countries not listed in our directory, you can call the following number collect to the United States: 1-636-722-7111. A: • Find two million ATMs worldwide with 30 street level and 210 city level countries and territories • Locate your own bank's ATMs to make a deposit or avoid transaction fees • Find U.S. Merchants that offer cash back at checkout when you make a purchase using your debit card • Search for U.S. Locations where you can get or reload a prepaid card • Find out where you can use your contactless-enabled card or device to make a purchase. Apple Pay TM enabled devices can be used at U.S. Merchants wherever contactless is accepted. A: In the U.S., Disbursements and P2P payments make up $4 trillion per year; most of these payments are made via checks, ACH transfers and cash. Currently, the methods for these payments are slow, lack ubiquity and create security concerns. Consumers want to be able to send and receive money using their connected devices regardless of where they bank and disbursers are looking for cheaper and more efficient ways to send money to their consumers. In line with Mastercard's vision to build a World Beyond Cash TM, Mastercard Send aims to make payments easier, safer and more efficient for all parties. A: While most electronic P2P and Disbursements' solutions rely on slow, batch-oriented ACH methods, the Mastercard Send solution leverages debit networks to move funds, typically within seconds. Mastercard Send is unique: funds can be transferred to virtually all debit cards in the U.S. And, in most cases, funds can be transferred typically within seconds. Through a set of APIs, a service provider can request a transfer through a sending acquirer, which Mastercard then routes to any U.S. Bank account via a debit card regardless of the brand. A: One role that issuers play in a Send transaction is as receiving institutions. In this role, issuers are required to post funds to their cardholders' accounts. When a service provider sends funds to a debit account using Transaction Code 28, the issuer of the receiver's debit card is paid a share of network fees. Once an issuer has complied with the MoneySend mandate to enable Transaction Code 28, they will be eligible to start collecting these fees. For more information on the mandate, see Global Operations Bulletin No. 2 (February 2, 2014). A: An issuer could offer P2P payment services by leveraging the Mastercard Send API to allow their cardholders to send and receive payments with their friends and family. While Mastercard Send is a critical part of a P2P program, interested issuers should consider the other necessary implementation measures and development requirements. These considerations should include: customer acquisition costs, receiver management requirements for users without accounts at a bank, the necessary user interfaces for a standalone or integrated mobile application, among other considerations. A: After you register your Mastercard Everyday Prepaid Card, the best way to add funds to your card is to set up direct deposit of your paycheck. Take your card's direct deposit information to your employer to have your paycheck automatically put on your card each payday. Direct deposit information varies, so check your card packaging or contact the card issuer. You can also add money to your card at participating retail locations. Check your card packaging or contact the card issuer to find out which retailers are supported. A: Prepaid travel cards work just like all Mastercard prepaid cards, which means you can spend up to the value placed on the card anywhere Debit Mastercard is accepted. You can shop in stores, online or over the phone. As you make purchases with the card, funds are immediately deducted from the available card balance. You can continue to use your card until the card balance has been depleted or until the expiration date shown on the card. You might want to check your card balance before you shop since the merchant or service provider may not be able to retrieve this information for you. A: Click here to access the rePower Merchant Locator. Type in a city and state, or a zip code to search the thousands of retail locations for the one nearest you. You can further narrow down the list by providing a street address or a merchant's name. Retailers who support the card swipe reload method will have 'Card Swipe' listed next to their names and those who enable Mastercard rePower reloads through the Green Dot® MoneyPak card will have 'MoneyPak' listed. Retailers who support both card swipe and MoneyPak will have 'Both'. A: A merchant located in the United States or a U.S. Region/territory may set a minimum transaction amount for credit cards only. The amount may not exceed $10 and cannot discriminate between issuers or between Mastercard and other acceptance brands. Merchants are not permitted to require a Mastercard cardholder to pay a minimum amount for a Debit Mastercard or Mastercard prepaid card transaction. If you believe that a merchant inappropriately requested a minimum charge, you may report this by completing a form available through this link:. A: As a result of a court-approved settlement, Mastercard agreed to modify its rules to permit U.S. Merchants to surcharge Mastercard credit cards as long as they complied with certain limitations. Merchants have the option to add a surcharge at the 'brand level' where the surcharge is the same for all Mastercard credit cards, regardless of the card's issuer, or they can add a surcharge at the 'product level' (e.g., apply a surcharge to all World Mastercard cards regardless of the card's issuer but not standard Mastercard credit cards). Click for the details. A merchant's ability to surcharge on credit cards is subject to any restrictions or prohibitions imposed by applicable state law. Mastercard rules continue to prohibit merchants from applying a surcharge on debit cards. If you are not certain whether you have been charged appropriately, or you would like to report a questionable charge, and provide the information requested. A: The surcharge that the merchant assesses may not exceed the merchant discount rate that the merchant pays for the credit card that is surcharged. In the United States, this charge for Mastercard typically ranges from 1.5% to 3% and in no event may the merchant surcharge greater than 4%. Merchants much clearly disclose their surcharges at the register and clearly indicate the amount of the surcharge on the receipt. If you do not believe that you have been charged appropriately, or you would like to report a questionable charge,. A: Mastercard does not contact individuals to request personal information including credit or debit card account information. If you received an unsolicited phone call, email, text or social media request from an individual claiming to be a Mastercard representative do not respond. Mastercard cardholders should always safeguard their personal information and not respond to any suspicious emails or inquiries. If you are a victim of a phishing attack and believe your account information may have been compromised, please contact the financial institution that issued your credit card or debit card to report the incident. A: Mastercard does not issue cards and we can't tell you if an account has been opened in your name. If you know the name of the financial institution, you should contact them immediately and cancel the account. Then you should notify each of the three credit reporting agencies: • Equifax - • Trans Union - • Experian - The credit reporting agencies should provide you with a copy of your credit report. Even if you do not see an unusual creditor on a credit report, you should formally write to advise them of the situation. For more information on credit reports, go to and select credit reports. A: If your question is not listed among the previous topics and questions, your best option is to contact the financial institution that issued your account as only they hold account specific and unique information. Typically, there is a customer service number for your financial institution on the back of the card that you can call. You can always contact the Mastercard Assistance Center either toll-free at 1-800-627-8372 or collect at 1-636-722-7111. If you believe that your question can only be answered by Mastercard,. A: The ability to support SecureCode may already be available through your transaction processor. All you need to do is: • Contact your transaction processor to confirm that they support the Mastercard SecureCode program. • Install a Mastercard SecureCode compliant 'plug-in' application on your site. • Test your site with Mastercard to ensure that SecureCode is working properly. • Display the Mastercard SecureCode logo to let your customers know that you are working to secure online shopping. • Transmit transaction authentication values to the card issuer via your normal authorization process using the Universal Cardholder Authentication Field (UCAF). A: By providing an option for customers to use SecureCode, you will gain protection from cardholder unauthorized chargebacks for fully compliant transactions. Such protection is designed to reduce your chargeback exposure and processing expenses. And when you implement SecureCode, consumer confidence increases, making your customers more likely to make an online purchase from you. It can also help you to expand the geographic reach of your business by selling to customers in countries where online debit cards are more widely used than credit cards. In addition to added protection against chargebacks for these customers, you will also be able to process their Maestro debit transactions. A: The personal greeting is a message that you create during sign-up. Each time you make an online purchase at a participating merchant, you will be prompted to enter your SecureCode. At that time, you'll see your personal greeting and other purchase details. The personal greeting is your assurance that you are communicating with your financial institution. If the personal greeting displayed in the pop-up box is incorrect, you should not enter your SecureCode. You should contact customer service immediately by calling the number on the back of your enrolled Mastercard, and report a possible fraud. A: At Mastercard, safety and security are foundational principles central to every part of our company and the innovative technology platforms and services we enable. We know that secure products and services are essential to the trust that our customers, cardholders, merchants and other partners place in us. If you believe you have identified a security vulnerability, we encourage you to report this to us as soon as possible through our. We will investigate all verifiable and legitimate reports and do our best to quickly fix the problem that you have helped us spot as quickly as possible. A: Mastercard recommends that you contact your acquiring bank to assist you with: • Determining your merchant level (L1, L2, L3 or L4) based on combined annual Mastercard and Maestro transaction counts • Confirming PCI DSS compliance validation requirements It is your acquirer who will manage your PCI DSS compliance and report your status directly to Mastercard. Mastercard does not accept PCI DSS validation documentation sent by a merchant. A merchant that stores, processes or transmits cardholder data must be PCI DSS compliant and a merchant that uses third party-provided payment applications must only use payment applications that are compliant with the Payment Card Industry Payment Application Data Security Standard (PA-DSS). A: An acquirer is responsible for implementing a PCI DSS compliance program for their L1, L2, L3 and L4 merchants. To ensure compliance with the SDP Program, you should: • Help determine merchant levels based on combined annual Mastercard and Maestro transaction counts • Review and communicate merchant compliance validation requirements for each L1, L2, L3 and L4 merchant in your portfolio • Set deadlines for merchants to submit PCI DSS validation documents • Submit a completed SDP Acquirer Submission and Compliance Status Form to [email protected] reporting on your merchants’ PCI DSS compliance status (only L1, L2 and L3 merchants are required to be reported via the SDP Form. L4 merchant reporting to Mastercard is optional.). A: Mastercard recommends that you review SDP Program requirements to assist with: • Determining your Service Provider level (L1 or L2) based on type and combined annual Mastercard and Maestro transaction counts • Confirming PCI DSS compliance validation requirements • Once compliant, submit a signed Attestation of Compliance (AOC); or for those SAQ eligible, submit the SAQ D AOC and latest passing scan to [email protected]. • If not yet compliant, the PCI Action Plan for Service Providers should be completed and submitted to [email protected]. A Service Provider that stores, processes or transmits cardholder data must be PCI DSS Compliant and a Service Provider that uses third party-provided payment applications must only use payment applications that are compliant with the PA-DSS. To be listed on The Mastercard Compliant Service Provider List updated semi-monthly on the SDP website, a Service Provider must have submitted to [email protected] a copy of their AOC by a QSA reflecting validation of the company being PCI DSS compliant and been registered as a Service Provider by one or more Mastercard Customers. A: A merchant that is not deemed to be a L1, L2, or L3 merchant is a L4 merchant. While a L4 merchant is not required to validate/report their PCI DSS compliance to Mastercard, a L4 merchant is still required to be PCI DSS compliant and must successfully complete: • An annual self-assessment • Quarterly network scans conducted by a PCI SSC Approved Scanning Vendor (ASV) Note: A L4 merchant completing a Self-Assessment Questionnaire (SAQ) should consult with their acquirer to determine which SAQ is appropriate for their environment. A: Mastercard offers a merchant implementing secure technologies such as EMV or P2PE alternative ways to validate their PCI DSS compliance. A qualifying merchant may validate compliance through either the Mastercard Risk-based Approach (applies to eligible non-U.S. Merchants only) or the Mastercard PCI Compliance Validation Exemption Program (the “Exemption Program”) (applies to eligible merchants in all Regions). Both the Risk-based Approach and PCI Compliance Validation Exemption Program provide some validation/reporting relief to merchants. Mastercard encourages you to review 10.3.4.1 Risk-based Approach and 10.3.4.2 PCI Compliance Validation Exemption Program in the Security Rules and Procedures Manual – Merchant Edition for more information on eligibility requirements. A merchant that does not satisfy all eligibility criteria must continue to validate its PCI DSS compliance in accordance with the SDP Program’s 10.3.4 Implementation Schedule. A: The Mastercard ISA mandate applies to Level 1 and Level 2 Merchants: • A Level 1 Merchant that uses an internal auditor for compliance validation must ensure that primary internal auditor staff engaged in validating compliance with the PCI DSS attend the PCI SSC-offered Internal Security Assessor (ISA) Program and pass the PCI SSC associated accreditation examination annually in order to continue to use an internal auditor. • A Level 2 Merchant must ensure that staff engaged in self-assessing the merchant’s compliance with the PCI DSS attend the PCI SSC-offered Internal Security Assessor (ISA) Program and pass the PCI SSC associated accreditation examination annually in order to continue the option of self-assessment for compliance validation. Note: The Mastercard ISA mandate does not apply to L3 merchants. A: All merchants and Service Providers that use third party-provided payment applications must only use payment applications that are compliant with the Payment Card Industry Payment Application Data Security Standard (PCI PA-DSS), as applicable. The applicability of the PCI PA-DSS to third party-provided payment applications is defined in the PCI PA-DSS Program Guide found in the Document Library at. Mastercard also recommends that merchants use a Qualified Integrator & Reseller (QIR) listed on the PCI SSC website to implement a PCI PA-DSS-compliant payment application. A: The surcharge that the merchant assesses may not exceed the merchant discount rate that the merchant pays for the credit card that is surcharged. In the United States, this charge for Mastercard typically ranges from 1.5% to 3%. In no event may the merchant surcharge an amount greater than 4%. Merchants much clearly disclose their surcharges at the register and clearly indicate the amount of the surcharge on the receipt. If you are not certain whether you have been charged appropriately, or you would like to report a questionable charge, and provide the information requested. A: Merchants can charge an extra fee to customers who pay with Mastercard branded credit cards, where permissible by law. These fees are not allowed on Debit Mastercard or Mastercard prepaid cards. Additional details on these surcharges can be found. Merchants must clearly disclose their surcharge policies at the register and clearly indicate the amount of the surcharge on the receipt. If you are not certain whether you have been charged appropriately, or would like to report a questionable charge, email us directly. A: Please be advised that Mastercard does not attempt to contact individuals to request personal information including credit or debit card account information. If you receive an unsolicited phone call, email, text message or social media request from an individual claiming to be a Mastercard representative: DO NOT RESPOND. Mastercard cardholders should always safeguard their personal information and not respond to any suspicious emails or other inquiries. If you are a victim of a phishing attack and believe your account information may have been compromised, please contact the bank or financial institution that issued your credit or debit card to report the incident. A: If you did not receive an item that you purchased or if you received an incorrect item, you should first contact the merchant to try to resolve the situation. If you can't come to an agreement and you want to dispute the transaction, this must be done directly with the financial institution that issued your Mastercard. Typically, there is a customer service number for your financial institution on the back of the card. You can always contact the Mastercard Assistance Center either toll-free at 1-800-627-8372 or collect at 1-636-722-7111 and we will connect you to your financial institution. A: If you purchased an item but received the wrong one, please contact the merchant to try to resolve the situation. If you and the merchant cannot resolve the issue, and you want to file a disputed transaction, this must be done directly with the financial institution that issued your Mastercard. Typically, there is a customer service number for your financial institution on the back of the card that you can call. You can always contact the Mastercard Assistance Center either toll-free at 1-800-627-8372 or collect at 1-636-722-7111. A: If your question is not listed, your best option is to contact the financial institution that issued your account as only they hold account specific and unique information. Typically, there is a customer service number for your financial institution on the back of the card that you can call. You can always contact the Mastercard Assistance Center either toll-free at 1-800-627-8372 or collect at 1-636-722-7111. If you believe that your question can only be answered by Mastercard, to submit your question. • Credit Card Activation • with your User ID and PIN. • Under Cards, select Activate Credit Cards and log in with your 6-Digit iB Secure PIN. • Select the Credit Card you would like to activate. • Accept the Terms and Conditions and click Next. • Verify the details before clicking Submit. • Debit Card Activation • with your User ID and PIN. • Under Cards, select Activate Debit & ATM Cards and log in with your 6-Digit iB Secure PIN. • Select the Debit or ATM Card you would like to activate. • Accept the Terms and Conditions and click Next. • Verify the details before clicking Submit. Don't have iBanking? • Insert your NRIC, ATM/Debit/Credit Card or scan your Passport and complete the authentication process. • Under Card Services, select Activate Card. • Insert your inactive New ATM/Debit/Credit Card. • Enter your New Card PIN* received in a seperate mail. • Provide your NRIC Number, Nationality and Date of Birth. • Press Confirm to complete the activation. Note: • *You will receive your New Card PIN within 5 working days after you have received your New Card. Find the nearest Video Teller Machine (VTM) using our. Related Information • • We welcome your feedback. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
April 2018
Categories |